Amine Boukhtouta
Amine Boukhtouta
Experienced Researcher
Verified email at
Cited by
Cited by
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
Insights from the analysis of the Mariposa botnet
P Sinha, A Boukhtouta, VH Belarde, M Debbabi
2010 Fifth International Conference on Risks and Security of Internet and …, 2010
Network malware classification comparison using DPI and flow packet headers
A Boukhtouta, SA Mokhov, NE Lakhdari, M Debbabi, J Paquet
Journal of Computer Virology and Hacking Techniques 11, 2015
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
C Fachkha, E Bou-Harb, A Boukhtouta, S Dinh, F Iqbal, M Debbabi
2012 7th International Conference on Risks and Security of Internet and …, 2012
Graph-Theoretic Characterization of Cyber-threat Infrastructures
A Boukhtouta, D Mouheb, M Debbabi, O Alfandi, F Iqbal, M El Barachi
Digital Investigation: The International Journal of Digital Forensics and …, 2015
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta, ...
2010 Fourth International Conference on Emerging Security Information …, 2010
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective
S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi
The dataflow pointcut: a formal and practical framework
D Alhadidi, A Boukhtouta, N Belblidia, M Debbabi, P Bhattacharya
Proceedings of the 8th ACM international conference on Aspect-oriented …, 2009
Detecting Internet abuse by analyzing passive DNS traffic: A survey of implemented systems
S Torabi, A Boukhtouta, C Assi, M Debbabi
IEEE Communications Surveys & Tutorials 20 (4), 3389-3415, 2018
Towards Fingerprinting Malicious Traffic.
A Boukhtouta, NE Lakhdari, SA Mokhov, M Debbabi
ANT/SEIT, 548-555, 2013
A new paradigm for decision making: A synergy between business intelligence and digital cockpits
A Boukhtouta, M Debbabi, N Tawbi
10th ISPE International Conference on Concurrent Engineering: Research and …, 2003
Inferring Malware Family through Application Protocol Sequences Signature
A Boukhtouta, NE Lakhdari, M Debbabi
6th International Conference on New Technologies Mobility and Security (NTMS …, 2014
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope
S Torabi, E Bou-Harb, C Assi, EMB Karbab, A Boukhtouta, M Debbabi
IEEE Transactions on Dependable and Secure Computing, 2020
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology
A Boukhtouta, M Pourzandi, R Brunner, S Dault
IFIP Annual Conference on Data and Applications Security and Privacy, 312-329, 2018
On the Generation of Cyber Threat Intelligence: Malware and Network Traffic Analyses
A Boukhtouta
Concordia University, 2016
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia ...
Foundations and Techniques for Open Source Software Certification 2010 33, 18, 2010
Capturing Returned Computable Values in AspectJ for Security Hardening
A Boukhtouta, D Alhadidi, M Debbabi
Information Security Journal: A Global Perspective 18 (2), 87-98, 2009
A Practical Framework for The Dataflow Pointcut in AspectJ
A Boukhtouta, D Alhadidi, M Debbabi
2009 International Conference on Availability, Reliability and Security, 835-840, 2009
The system can't perform the operation now. Try again later.
Articles 1–18