Search Results for author: Mourad Debbabi

Found 8 papers, 0 papers with code

An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids

no code implementations23 Oct 2023 Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi

After the controller synthesis and presentation of the attack scenarios, we demonstrate the effectiveness and success of our defense mechanism against the three known types of LA attacks.

Dynamic Load Altering EV Attacks Against Power Grid Frequency Control

no code implementations20 Jul 2022 Mohammad Ali Sayed, Mohsen Ghafouri, Mourad Debbabi, Chadi Assi

Driven by the necessity to combat climate change, Electric Vehicles (EV) are being deployed to take advantage of their ability in reducing emissions generated by the transportation sector.

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning

no code implementations27 Jun 2022 Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong

Outsourcing anomaly detection to third-parties can allow data owners to overcome resource constraints (e. g., in lightweight IoT devices), facilitate collaborative analysis (e. g., under distributed or multi-party scenarios), and benefit from lower costs and specialized expertise (e. g., of Managed Security Service Providers).

Anomaly Detection

Electric Vehicle Attack Impact on Power Grid Operation

no code implementations22 Nov 2021 Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, Mourad Debbabi

We start by examining the existing vulnerabilities in the EV ecosystem that can be exploited to control the EV charging and launch attacks against the power grid.

Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS

no code implementations1 Aug 2018 Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir Mudur

Visualization requirements in Forensic Lucid have to do with different levels of case knowledge abstraction, representation, aggregation, as well as the operational aspects as the final long-term goal of this proposal.

Management

DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware

no code implementations19 Feb 2017 ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb

However, to the best of our knowledge, there is no such fingerprinting technique that leverages dynamic analysis and would act as the first defense against Android malware attacks.

Cryptography and Security

MARFCAT: Transitioning to Binary and Larger Data Sets of SATE IV

no code implementations16 Jul 2012 Serguei A. Mokhov, Joey Paquet, Mourad Debbabi, Yankui Sun

We present a second iteration of a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE IV static analysis tool exposition workshop's data sets that include additional test cases, including new large synthetic cases.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.