• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
Digital Commons @ New Haven

Digital Commons @ New Haven

    Content Posted in 2022

    Link

    A Framework for Monitoring SIP Enterprise Networks, Mohamed Nassar, Radu State, and Olivier Festor

    Link

    An SQL-like Query Tool for Data Anonymization and Outsourcing, Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, and Bechara al Bouna

    Link

    Artemisa: An Open-Source Honeypot Back-End to Support Security in VoIP Domains, Rodrigo do Carmo, Mohamed Nassar, and Olivier Festor

    Link

    A Survey on Fraud and Service Misuse in Voice Over IP (VoIP) Networks, Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, and Olivier Festor

    Link

    A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy, Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja

    Link

    Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification, Haidar Safa, Mohamed Nassar, and Wael Al Rahal Al Orabi

    Link

    Blockchain for Explainable and Trustworthy Artificial Intelligence, Mohamed Nassar, Khaled Salah, Muhammad Habib ur Rehman, and Davor Svetinovic

    PDF

    Carry Forward Modeling for High-Frequency Limit-Order Executions: An Emerging Market Perspective, Aritra Pan and Arun Kumar Misra

    PDF

    Does Absorptive Capacity Protect Shareholder Wealth in Times of Crisis? Evidence from the COVID-19 Pandemic, Amanjot Singh

    PDF

    Economic Freedom, Capital, and Growth: Evidence from the States, Sarah Ihlenfeld, Joshua C. Hall, and Yang Zhou

    PDF

    Effects of Product and Product Company Information on Generation Zs’ Purchasing Preferences, Steven Dahlquist and Michael Scott Garver

    Link

    Examining the Role of Artificial Intelligence on Modern Auditing Techniques, Parina Lotlikar and James Mohs

    Link

    Exploring the Impact of Tariffs on the U.S. Economy, FDI and Trade: Lessons from China, Kelly Flannery and James Mohs

    Link

    Holistic VoIP Intrusion Detection and Prevention System, Mohamed Nassar, Saverio Niccolini, Radu State, and Thilo Ewald

    PDF

    Industry 4.0 (I4.0) Based Virtual Organization Model for the Coordination of Sustainable Textile Supply Chain, Patanjal Kumar, Dheeraj Sharma, and Peeyush Pandey

    Link

    K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset, Mohamed Nassar, Nathalie Wehbe, and Bechara al Bouna

    Link

    Labeled VoIP Data-Set for Intrusion Detection Evaluation, Mohamed Nassar, Radu State, and Olivier Festor

    Link

    Modeling Malware as a Language, Yara Awad, Mohamed Nassar, and Haidar Safa

    Link

    Monitoring SIP Traffic Using Support Vector Machines, Mohamed Nassar, Radu State, and Olivier Festor

    Link

    On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets, Sara Barakat, Bechara al Bouna, Mohamed Nassar, and Christophe Guyeux

    PDF

    Opportunism vs. Excellence in Academia: Quality Accreditation of Collegiate Business Schools, João Ricardo Faria and Franklin G. Mixon Jr.

    Link

    Outbound SPIT Filter with Optimal Performance Guarantees, Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc

    Link

    Paillier's Encryption: Implementation and Cloud Applications, Mohamed Nassar, Abdelkarim Erradi, and Qutaibah M. Malluhi

     

    Police Science: Key Readings, John DeCarlo (Editor)

    PDF

    Presenting Volume 25 and Celebrating ABR Reviewers, Kamal Upadhyaya and Subroto Roy

    Link

    Protecting from Cloud-based SIP Flooding Attacks by Leveraging Temporal and Structural Fingerprints, Khaled Dassouki, Haidar Safa, Mohamed Nassar, and Abbas Hijazi

    Link

    Risk Management in VoIP Infrastructures using Support Vector Machines, Mohamed Nassar, O. Dabbebi, R. Badonnel, and O. Festor

    Link

    RPig: A Scalable Framework for Machine Learning and Advanced Statistical Functionalities, MingXue Wang, Sidath B. Handurukande, and Mohamed Nassar

    Link

    Secure and Private Outsourcing of Shape-Based Feature Extraction, Shumiao Wang, Mohamed Nassar, Mikhail Atallah, and Qutaibah Malluhi

    Link

    Secure Outsourcing of Matrix Operations as a Service, Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah Malluhi

    Link

    Secure Outsourcing of Network Flow Data Analysis, Mohamed Nassar, Bechara al Bouna, and Qutaibah Malluhi

    Link

    Securing Aggregate Queries for DNA Databases, Mohamed Nassar, Qutaibah Malluhi, Mikhail Atallah, and Abdullatif Shikfa

    PDF

    The Role of Multiple Large Shareholders in Dividend Payouts: Evidence from India, Samridhi Suman and Shveta Singh

    Link

    Throttling Malware Families in 2D, Mohamed Nassar and Haidar Safa

    Link

    Transfer Learning for Malware Multi-Classification, Mohamad Al Kadri, Mohamed Nassar, and Haidar Safa

    Link

    VoIP Honeypot Architecture, Mohamed Nassar, Radu State, and Olivier Festor

    Link

    VoIP Malware: Attack Tool & Attack Scenarios, Mohamed Nassar, Radu State, and Olivier Festor

    PDF

    Volatility Spillovers and Nexus across Oil, Gold, and Stock European Markets, Chao Ren

    PDF

    When Failure is Neither Fatal nor Final: Understanding Re-internationalization Processes, Salman Ali and Ajeet N. Mathur

    PDF

    Why and When Do Leaders Express Humility? Leader Expressed Humility as Psycho-Social Signaling, Kelly G. Manix

 
 
 

Search

Advanced Search

  • Notify me via email or RSS

Navigation

  • Home
  • About
  • FAQ
  • My Account
  • Contact Us
  • UNH website
  • UNH Library

Browse

  • Collections
  • Disciplines
  • Authors

Author Corner

  • Author FAQ
  • Submit Research
 
Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Digital Commons @ New Haven is a service of the University of New Haven Library.