Publications

 

Journals

 

Ghita Mezzour, William Frankenstein, Kathleen M. Carley, L. Richard Carley.A Socio-Computational Approach to Predicting Bioweapon Proliferation. IEEE Transactions on Computational Social Systems, 1-10, April 2018.
Link to PDF.

 

Ghita Mezzour, L. Richard Carley, Kathleen M. Carley. Longitudinal Analysis of a Large Corpus of Cyber Threat Descriptions. Journal of Computer Virology and Hacking Techniques, 12(1), 11-22, February 2016.
Link to PDF.

 

William Frankenstein, Ghita Mezzour, Kathleen M. Carley, L. Richard Carley. Remote Assessment of Countries’ Nuclear, Biological and Cyber Capabilities: Joint Motivation and Latent Capability Approach. Social Network Analysis and Mining (SNAM), 5(1) 1:21, 2015
Link to PDF.

 

Ghita Mezzour, Kathleen M. Carley. Spam Diffusion in a Social Network Initiated by Hacked Email Accounts. International Journal of Security and Networks (IJSN), 9(3):144-153, 2014.
Link to PDF. News article.

 

Conferences

 

I. Makdoun, G. Mezzour, K. Carley, I. Kassou. Analyzing the needs of the Automotive Job Market in Morocco. Proceedings of the 13th International Conference on Computer Science and Education (ICCSE 2018): Colombo, Sri Lanka, 2018.
PDF.

Imane Khaouja, Ibrahim Rahhal, Mehdi El Ouali, Ghita Mezzour, Kathleen M. Carley, and Ismail Kassou. Analyzing the Needs of the Offshore Sector in Morocco. IEEE Global Engineering Education Conference (EDUCON), April 2018, Santa Cruz de Tenerife, Canary Islands, Spain
PDF.

 

Imane Khaouja, Ibtissam Makdoun, Ghita Mezzour, Ibrahim Rahhal, Hanane Benchekroun, Yousra El Hatib, and Ismail Kassou. Social Network Analysis of Job Market Stakeholders in Morocco. Short paper, International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), July 2017, Washington, DC, USA.
PDF.

 

Ghita Mezzour, Kathleen M. Carley, L. Richard Carley. Global Variation in Attack Encounters and Hosting. Proceedings of ACM Symposium and Bootcamp on the Science of Security (HotSoS), April 2017, Hanover, MD, USA.
PDF.

 

Abdellah Houmz, Mohamed Salim Mezzene, Asmaa Tellabi, Ghita Mezzour, Mohammed El Koutbi. Field Study of Cybercafé Usage and Security in Morocco. Proceedings of International Conference on Advanced Communication Systems and Information Security (ACOSIS), October 2016, Marrakesh, Morocco.
PDF

 

Anass Sebbar, Salah Eddyne Boulahya, Ghita Mezzour, Mohammed Boulmalf. An Empirical Study of WIFI Security and Performance in Morocco. Wardriving in Rabat. Proceedings of International Conference on Electrical and Information Technologies (ICEIT), May 2016, Tangiers, Morocco.
PDF PPT

 

Ghita Mezzour, L. Richard Carley, Kathleen M. Carley. An Empirical Study of Global Malware Encounters. Proceedings of ACM Symposium and Bootcamp on the Science of Security (HotSoS), April 2015, Urbana, IL, USA.
PDF.

 

Ghita Mezzour, Adrian Perrig, Virgil Gligor, and Panos Papadimitratos. Privacy-Preserving Relationship Path Discovery in Social Networks. Proceedings of International Conference on Cryptology and Network Security (CANS), December 2009.
PDF PPT

 

Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun.A Trustable Reputation Scheme Based on Private Relationships. Proceedings of IEEE/ACM International Conference on Social Network Analysis and Mining (ASONAM), July 2009.
PDF

 

Mark Luk, Ghita Mezzour, Adrian Perrig, and Virgil Gligor. MiniSec: A Secure Sensor Network Communication Architecture. Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2007.
PDF PPT

 

Workshop

 

Papadimitratos, Ghita Mezzour , Jean-Pierre Hubaux. Certificate Revocation List Distri-bution in Vehicular Communication Systems. Short paper, ACM MobiCom VANET, September 2008.
PDF PPT

 

Technical Reports

 

Ghita Mezzour , L. Richard Carley, and Kathleen M. Carley. Global Mapping of Cyber Attacks. Technical Report CMU-ISR-14-111 .
PDF

 

Ghita Mezzour , Ahren Studer, Michael Farb, Jason Lee, Jonathan McCune, Hsu-Chun Hsiao, and Adrian Perrig. Ho-Po Key: Leveraging Physical Constraints on Human Motion to Authentically Exchange information in a Group. Technical Report CMU-CyLab-11-004.
PDF

 

Panos Papadimitratos, Ghita Mezzour , and Jean-Pierre Hubaux. Certificate Revocation List Distribution in Vehicular Communication Systems. Technical Report LCA-REPORT-2006-006.
PDF