Mohamed NabeelWeekend Read: KAN — Kolmogorov-Arnold NetworksKey take aways from KAN paperMay 13May 13
Mohamed NabeelCatching Phishing/Spam Emails without Having Access to their ContentMost of existing phishing/spam filters out there rely on email content (i.e. body) to flag phishing/spam emails. Can we still detect them…Oct 3, 2021Oct 3, 2021
Mohamed NabeelCompromised vs.Note: This write up is based on our USENIX Security 2021 paper on detecting compromised vs. attack domains. [paper]May 23, 2021May 23, 2021
Mohamed NabeelDetecting Stealthy Malicious Domains via Graph InferencesConnecting all the domains in the world and propagating labels across the graph to detect new malicious domains!Apr 6, 20181Apr 6, 20181
Mohamed NabeelMy RSA 2017 talk: Client side encryption without knowing its limits is a ticking time bomb!Recently I talked about pitfalls of end-to-end encryption for client-server systems in this year’s RSA conference, the top industrial…Apr 25, 2017Apr 25, 2017
Mohamed NabeelEnd to End Encryption Research EncyclopediaThis post serves to point to research efforts in the academia and the industry to build systems that provide end to end encryption. It will…Feb 5, 2017Feb 5, 2017
Mohamed NabeelinWe’ve moved to freeCodeCamp.org/newsThe many, many ways that cryptographic software can failWhen cryptographic software fails, what’s to blame?Jan 25, 20172Jan 25, 20172
Mohamed NabeelinDecentralize.TodayEncryption is useless, completely uselessUnless you know how and where it “lives”!Jan 18, 2017Jan 18, 2017
Mohamed NabeelinDecentralize.TodayWhy we haven’t figured out client-side encryption right (yet)?Views from a person who has added/has been attempting to add better client side encryption to relational databases [Our previous work…Jan 10, 2017Jan 10, 2017
Mohamed NabeelLove You Forever“I’ll love you forever, I’ll like you for always, As long as I’m living.. my baby you’ll be”Jan 8, 2017Jan 8, 2017