Name
Affiliation
Papers
SAMI ZHIOUA
concordia university wisconsin
25
Collaborators
Citations 
PageRank 
24
72
13.00
Referers 
Referees 
References 
153
429
276
Search Limit
100429
Title
Citations
PageRank
Year
Finding a Needle in a Haystack: The Traffic Analysis Version.00.342019
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks.00.342018
On PLC network security.20.422018
NetInfoMiner: High-level information extraction from network traffic00.342017
SCADA-SST: a SCADA security testbed00.342016
Analyzing anonymity attacks through noisy channels.20.352015
The web browser factor in traffic analysis attacks10.352015
Attacking Tor through Unpopular Ports20.362013
Testing probabilistic equivalence through Reinforcement Learning30.412013
Tor traffic analysis using Hidden Markov Models.20.372013
The Middle East under Malware Attack Dissecting Cyber Weapons50.542013
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models.30.382013
Anonymity attacks on mix systems: a formal analysis30.552011
Bootstrapping trust of web services through behavior observation40.402011
A New Information Leakage Measure for Anonymity Protocols20.372010
Learning the Difference between Partially Observable Dynamical Systems10.352009
Common Criteria Approach to J2ME CLDC Security Requirements00.342006
Security Evaluation Of J2me Cldc Embedded Java Platform112.262006
Trace equivalence characterization through reinforcement learning10.352006
E-Bunny: A Dynamic Compiler For Embedded Java Virtual Machines50.702005
Java for Mobile Devices: A Security Study70.782005
Security Analysis of Wireless Java10.512005
Security Analysis of Mobile Java60.792005
A dynamic compiler for embedded Java virtual machines70.622004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines40.442004