Fadi Mohsen
Cited by
Cited by
Towards enhancing the security of oauth implementations in smart phones
M Shehab, F Mohsen
2014 IEEE International Conference on Mobile Services, 39-46, 2014
Android keylogging threat
F Mohsen, M Shehab
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
Securing OAuth implementations in smart phones
M Shehab, F Mohsen
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
Hardening the oauth-webview implementations in android applications by re-factoring the chromium library
F Mohsen, M Shehab
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
Countering intrusiveness using new security-centric ranking algorithm built on top of elasticsearch
F Mohsen, H Abdelhaq, H Bisgin, A Jolly, M Szczepanski
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
A taxonomic classification of insider threats: Existing techniques, future directions & recommendations
U Rauf, F Mohsen, Z Wei
Journal of Cyber Security and Mobility 12 (2), 221-252, 2023
Detecting Android malwares by mining statically registered broadcast receivers
F Mohsen, H Bisgin, Z Scott, K Strait
2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017
Investigating the keylogging threat in android - User perspective (Regular research paper)
F Mohsen, E Bello-Ogunu, M Shehab
2016 Second International Conference on Mobile and Secure Services …, 2016
Private and anonymous data storage and distribution in cloud
Q Duan, Y Wang, F Mohsen, E Al-Shaer
2013 IEEE International Conference on Services Computing, 264-271, 2013
Security‐centric ranking algorithm and two privacy scores to mitigate intrusive apps
F Mohsen, H Abdelhaq, H Bisgin
Concurrency and Computation: Practice and Experience 34 (14), e6571, 2022
The listening patterns to system events by benign and malicious android apps
F Mohsen, M Shehab
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
A formal model for sustainable vehicle-to-grid management
MA Rahman, F Mohsen, E Al-Shaer
Proceedings of the first ACM workshop on Smart energy grid security, 81-92, 2013
Early detection of violating Mobile Apps: A data-driven predictive model approach
F Mohsen, D Karastoyanova, G Azzopardi
Systems and Soft Computing 4, 200045, 2022
Quantifying information exposure by web browsers
F Mohsen, M Shehab, M Lange, D Karastoyanova
Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3, 648-667, 2021
POSTER: Android System Broadcast Actions Broadcasts Your Privacy
F Mohsen, M Shehab, E Bello-Ogunu, A Al Jarrah
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Employee Watcher: A Machine Learning-based Hybrid Insider Threat Detection Framework
U Rauf, Z Wei, F Mohsen
2023 7th Cyber Security in Networking Conference (CSNet), 39-45, 2023
An approach to guide users towards less revealing internet browsers
F Mohsen, A Shtayyeh, M Struijk, R Naser, L Mohammad
Emerging Trends in Cybersecurity Applications, 69-94, 2022
Enhancing malware detection in Android application by incorporating broadcast receivers
H Bisgin, F Mohsen, V Nwobodo, R Havens
International Journal of Information Privacy, Security and Integrity 5 (1 …, 2021
Proposing and testing new security cue designs for oauth-webview-embedded mobile applications
F Mohsen, M Shehab
2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017
Hybrid Android Malware Detection: A Review of Heuristic-Based Approach
RA Yunmar, SS Kusumawardani, Widyawan, F Mohsen
IEEE Access 12, 41255 - 41286, 2024
The system can't perform the operation now. Try again later.
Articles 1–20