MiniSec: a secure sensor network communication architecture M Luk, G Mezzour, A Perrig, V Gligor
Proceedings of the 6th international conference on Information processing in …, 2007
532 2007 Certificate revocation list distribution in vehicular communication systems P Papadimitratos, G Mezzour, JP Hubaux
Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008
192 2008 Method for sending and receiving an evaluation of reputation in a social network SY Chiou, SY Chang, G Mezzour, A Perrig, HM Sun
US Patent 8,312,276, 2012
78 2012 Privacy-preserving relationship path discovery in social networks G Mezzour, A Perrig, V Gligor, P Papadimitratos
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
76 2009 Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time H Hammouchi, O Cherqi, G Mezzour, M Ghogho, M El Koutbi
Procedia Computer Science 151, 1004-1009, 2019
74 2019 Building a soft skill taxonomy from job openings I Khaouja, G Mezzour, KM Carley, I Kassou
Social Network Analysis and Mining 9, 1-19, 2019
46 2019 A data-driven characterization of modern Android spyware F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020
33 2020 An empirical study of wifi security and performance in morocco-wardriving in rabat A Sebbar, SE Boulahya, G Mezzour, M Boulmalf
2016 International Conference on Electrical and Information Technologies …, 2016
26 2016 Analysis of hacking related trade in the darkweb O Cherqi, G Mezzour, M Ghogho, M El Koutbi
2018 IEEE international conference on intelligence and security informatics …, 2018
25 2018 An empirical study of global malware encounters G Mezzour, KM Carley, LR Carley
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015
24 2015 : Predictive Behavioral Analysis of Recent Android Banking TrojansC Bai, Q Han, G Mezzour, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing 18 (3), 1378-1393, 2019
22 2019 Analyzing the needs of the offshore sector in Morocco by mining job ads I Khaouja, I Rahhal, M Elouali, G Mezzour, I Kassou, KM Carley
2018 IEEE Global Engineering Education Conference (EDUCON), 1380-1388, 2018
16 2018 Longitudinal analysis of a large corpus of cyber threat descriptions G Mezzour, LR Carley, KM Carley
Journal of Computer Virology and Hacking Techniques 12 (1), 11-22, 2016
14 2016 Analyzing cybersecurity job market needs in Morocco by mining job ads I Rahhal, I Makdoun, G Mezzour, I Khaouja, K Carley, I Kassou
2019 IEEE global engineering education conference (EDUCON), 535-543, 2019
13 2019 Analyzing the needs of the automotive job market in Morocco I Makdoun, G Mezzour, KM Carley, I Kassou
2018 13th International Conference on Computer Science & Education (ICCSE), 1-6, 2018
13 2018 Exploratory data analysis of a network telescope traffic and prediction of port probing rates M Zakroum, A Houmz, M Ghogho, G Mezzour, A Lahmadi, J François, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
11 2018 Detecting the impact of software vulnerability on attacks: A case study of network telescope scans A Houmz, G Mezzour, K Zkik, M Ghogho, H Benbrahim
Journal of Network and Computer Applications 195, 103230, 2021
9 2021 Assessing the Global Cyber and Biological Threat. G Mezzour
Carnegie Mellon University, USA, 2015
9 2015 Global variation in attack encounters and hosting G Mezzour, KM Carley, LR Carley
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
7 2017 A socio-computational approach to predicting bioweapon proliferation G Mezzour, W Frankenstein, KM Carley, LR Carley
IEEE Transactions on Computational Social Systems 5 (2), 458-467, 2018
6 2018