Content Posted in 2022
A Framework for Monitoring SIP Enterprise Networks, Mohamed Nassar, Radu State, and Olivier Festor
An SQL-like Query Tool for Data Anonymization and Outsourcing, Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, and Bechara al Bouna
Artemisa: An Open-Source Honeypot Back-End to Support Security in VoIP Domains, Rodrigo do Carmo, Mohamed Nassar, and Olivier Festor
A Survey on Fraud and Service Misuse in Voice Over IP (VoIP) Networks, Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, and Olivier Festor
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy, Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja
Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification, Haidar Safa, Mohamed Nassar, and Wael Al Rahal Al Orabi
Blockchain for Explainable and Trustworthy Artificial Intelligence, Mohamed Nassar, Khaled Salah, Muhammad Habib ur Rehman, and Davor Svetinovic
Carry Forward Modeling for High-Frequency Limit-Order Executions: An Emerging Market Perspective, Aritra Pan and Arun Kumar Misra
Does Absorptive Capacity Protect Shareholder Wealth in Times of Crisis? Evidence from the COVID-19 Pandemic, Amanjot Singh
Economic Freedom, Capital, and Growth: Evidence from the States, Sarah Ihlenfeld, Joshua C. Hall, and Yang Zhou
Effects of Product and Product Company Information on Generation Zs’ Purchasing Preferences, Steven Dahlquist and Michael Scott Garver
Examining the Role of Artificial Intelligence on Modern Auditing Techniques, Parina Lotlikar and James Mohs
Exploring the Impact of Tariffs on the U.S. Economy, FDI and Trade: Lessons from China, Kelly Flannery and James Mohs
Holistic VoIP Intrusion Detection and Prevention System, Mohamed Nassar, Saverio Niccolini, Radu State, and Thilo Ewald
Industry 4.0 (I4.0) Based Virtual Organization Model for the Coordination of Sustainable Textile Supply Chain, Patanjal Kumar, Dheeraj Sharma, and Peeyush Pandey
K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset, Mohamed Nassar, Nathalie Wehbe, and Bechara al Bouna
Labeled VoIP Data-Set for Intrusion Detection Evaluation, Mohamed Nassar, Radu State, and Olivier Festor
Modeling Malware as a Language, Yara Awad, Mohamed Nassar, and Haidar Safa
Monitoring SIP Traffic Using Support Vector Machines, Mohamed Nassar, Radu State, and Olivier Festor
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets, Sara Barakat, Bechara al Bouna, Mohamed Nassar, and Christophe Guyeux
Opportunism vs. Excellence in Academia: Quality Accreditation of Collegiate Business Schools, João Ricardo Faria and Franklin G. Mixon Jr.
Outbound SPIT Filter with Optimal Performance Guarantees, Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc
Paillier's Encryption: Implementation and Cloud Applications, Mohamed Nassar, Abdelkarim Erradi, and Qutaibah M. Malluhi
Police Science: Key Readings, John DeCarlo (Editor)
Presenting Volume 25 and Celebrating ABR Reviewers, Kamal Upadhyaya and Subroto Roy
Protecting from Cloud-based SIP Flooding Attacks by Leveraging Temporal and Structural Fingerprints, Khaled Dassouki, Haidar Safa, Mohamed Nassar, and Abbas Hijazi
Risk Management in VoIP Infrastructures using Support Vector Machines, Mohamed Nassar, O. Dabbebi, R. Badonnel, and O. Festor
RPig: A Scalable Framework for Machine Learning and Advanced Statistical Functionalities, MingXue Wang, Sidath B. Handurukande, and Mohamed Nassar
Secure and Private Outsourcing of Shape-Based Feature Extraction, Shumiao Wang, Mohamed Nassar, Mikhail Atallah, and Qutaibah Malluhi
Secure Outsourcing of Matrix Operations as a Service, Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah Malluhi
Secure Outsourcing of Network Flow Data Analysis, Mohamed Nassar, Bechara al Bouna, and Qutaibah Malluhi
Securing Aggregate Queries for DNA Databases, Mohamed Nassar, Qutaibah Malluhi, Mikhail Atallah, and Abdullatif Shikfa
The Role of Multiple Large Shareholders in Dividend Payouts: Evidence from India, Samridhi Suman and Shveta Singh
Throttling Malware Families in 2D, Mohamed Nassar and Haidar Safa
Transfer Learning for Malware Multi-Classification, Mohamad Al Kadri, Mohamed Nassar, and Haidar Safa
VoIP Honeypot Architecture, Mohamed Nassar, Radu State, and Olivier Festor
VoIP Malware: Attack Tool & Attack Scenarios, Mohamed Nassar, Radu State, and Olivier Festor
Volatility Spillovers and Nexus across Oil, Gold, and Stock European Markets, Chao Ren
When Failure is Neither Fatal nor Final: Understanding Re-internationalization Processes, Salman Ali and Ajeet N. Mathur
Why and When Do Leaders Express Humility? Leader Expressed Humility as Psycho-Social Signaling, Kelly G. Manix