default search action
Ghita Mezzour
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim:
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk. IEEE Trans. Dependable Secur. Comput. 20(2): 1074-1087 (2023) - 2021
- [j9]Abdellah Houmz, Ghita Mezzour, Karim Zkik, Mounir Ghogho, Houda Benbrahim:
Detecting the impact of software vulnerability on attacks: A case study of network telescope scans. J. Netw. Comput. Appl. 195: 103230 (2021) - [j8]Chongyang Bai, Qian Han, Ghita Mezzour, Fabio Pierazzi, V. S. Subrahmanian:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. IEEE Trans. Dependable Secur. Comput. 18(3): 1378-1393 (2021) - [c17]Ibtissam Makdoun, Ibrahim Rahhal, Ghita Mezzour, Ismail Kassou, Kathleen M. Carley:
Skill mismatch evidence for Cybersecurity skills in Morocco. ANT/EDI40 2021: 941-946 - [c16]Imane Khaouja, Ghita Mezzour, Ismail Kassou:
Unsupervised Skill Identification from Job Ads. IRI 2021: 147-151 - [c15]Imane Khaouja, Ibtissam Makdoun, Ghita Mezzour:
Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions. SBP-BRiMS 2021: 195-203 - 2020
- [j7]Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian:
A Data-driven Characterization of Modern Android Spyware. ACM Trans. Manag. Inf. Syst. 11(1): 4:1-4:38 (2020)
2010 – 2019
- 2019
- [j6]Imane Khaouja, Ghita Mezzour, Kathleen M. Carley, Ismail Kassou:
Building a soft skill taxonomy from job openings. Soc. Netw. Anal. Min. 9(1): 43:1-43:19 (2019) - [c14]Hicham Hammouchi, Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi:
Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time. ANT/EDI40 2019: 1004-1009 - [c13]Ibrahim Rahhal, Ibtissam Makdoun, Ghita Mezzour, Imane Khaouja, Kathleen M. Carley, Ismail Kassou:
Analyzing Cybersecurity Job Market Needs in Morocco by Mining Job Ads. EDUCON 2019: 535-543 - [c12]Hicham Hammouchi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi:
Predicting Probing Rate Severity by Leveraging Twitter Sentiments. IWCMC 2019: 883-888 - 2018
- [j5]Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
Remote assessment of countries' cyber weapon capabilities. Soc. Netw. Anal. Min. 8(1): 62:1-62:15 (2018) - [j4]Ghita Mezzour, William Frankenstein, Kathleen M. Carley, L. Richard Carley:
A Socio-Computational Approach to Predicting Bioweapon Proliferation. IEEE Trans. Comput. Soc. Syst. 5(2): 458-467 (2018) - [c11]Imane Khaouja, Ibrahim Rahhal, Mehdi Elouali, Ghita Mezzour, Ismail Kassou, Kathleen M. Carley:
Analyzing the needs of the offshore sector in Morocco by mining job ads. EDUCON 2018: 1380-1388 - [c10]Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi:
Analysis of Hacking Related Trade in the Darkweb. ISI 2018: 79-84 - [c9]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. ISI 2018: 175-180 - [c8]Abla El bekkali, Mohammed Boulmalf, Mohammad Essaaidi, Ghita Mezzour:
Securing the Internet of Things (IoT). WINCOM 2018: 1-6 - [i1]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. CoRR abs/1812.09790 (2018) - 2017
- [c7]Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
Global Variation in Attack Encounters and Hosting. HotSoS 2017: 62-73 - [e1]Ajith Abraham, Abdelkrim Haqiq, Adel M. Alimi, Ghita Mezzour, Nizar Rokbani, Azah Kamilah Muda:
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Morocco, November 21-23, 2016. Advances in Intelligent Systems and Computing 552, Springer 2017, ISBN 978-3-319-52940-0 [contents] - 2016
- [j3]Ghita Mezzour, L. Richard Carley, Kathleen M. Carley:
Longitudinal analysis of a large corpus of cyber threat descriptions. J. Comput. Virol. Hacking Tech. 12(1): 11-22 (2016) - [c6]Abdellah Houmz, Mohamed Salim Mezzene, Asmaa Tellabt, Ghita Mezzour, Mohammed El Koutbi:
Field study of cybercafe usage & security in Morocco. ACOSIS 2016: 1-7 - 2015
- [b1]Ghita Mezzour:
Assessing the Global Cyber and Biological Threat. Carnegie Mellon University, USA, 2015 - [j2]William Frankenstein, Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach. Soc. Netw. Anal. Min. 5(1): 5:1-5:21 (2015) - [c5]Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
An empirical study of global malware encounters. HotSoS 2015: 8:1-8:11 - 2014
- [j1]Ghita Mezzour, Kathleen M. Carley:
Spam diffusion in a social network initiated by hacked e-mail accounts. Int. J. Secur. Networks 9(3): 144-153 (2014)
2000 – 2009
- 2009
- [c4]Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun:
A Trustable Reputation Scheme Based on Private Relationships. ASONAM 2009: 19-24 - [c3]Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos:
Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 - 2008
- [c2]Panagiotis Papadimitratos, Ghita Mezzour, Jean-Pierre Hubaux:
Certificate revocation list distribution in vehicular communication systems. Vehicular Ad Hoc Networks 2008: 86-87 - 2007
- [c1]Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor:
MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint