Iosif-Viorel Onut

According to our database1, Iosif-Viorel Onut authored at least 50 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Web Scams Detection System.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Unsupervised Graph Neural Networks for Source Code Similarity Detection.
Proceedings of the Discovery Science - 26th International Conference, 2023

2022
Phishing Kits Source Code Similarity Distribution: A Case Study.
Proceedings of the IEEE International Conference on Software Analysis, 2022

2021
Proactive Detection of Phishing Kit Traffic.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
An Automatic Detection and Analysis of the Bitcoin Generator Scam.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

SemanticPhish: A Semantic-based Scanning System for Early Detection of Phishing Attacks.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
Automatic Detection and Analysis of the "Game Hack" Scam.
J. Web Eng., 2019

Domain Classifier: Compromised Machines Versus Malicious Registrations.
Proceedings of the Web Engineering - 19th International Conference, 2019

The "Game Hack" Scam.
Proceedings of the Web Engineering - 19th International Conference, 2019

2018
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces.
J. Internet Serv. Appl., 2018

Using AP-TED to Detect Phishing Attack Variations.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Phishing Attacks Modifications and Evolutions.
Proceedings of the Computer Security, 2018

Using URL shorteners to compare phishing and malware attacks.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

A DevOps framework for quality-driven self-protection in web software systems.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
On the Concept of Automatic User Behavior Profiling of Websites.
Int. J. Syst. Serv. Oriented Eng., 2017

Towards Building a New Age Commercial Contextual Advertising System.
Int. J. Syst. Serv. Oriented Eng., 2017

Tracking Phishing Attacks Over Time.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

Fault Tolerant P2P RIA Crawling.
Proceedings of the Networked Systems - 4th International Conference, 2016

Reconstructing Interactions with Rich Internet Applications from HTTP Traces.
Proceedings of the Advances in Digital Forensics XII, 2016

Establishing a successful industry-academia R&D project.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

Data-driven knowledge mobilization.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

D-ForenRIA: a distributed tool to reconstruct user sessions for rich internet applications.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

2015
Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
A Model-Based Approach for Crawling Rich Internet Applications.
ACM Trans. Web, 2014

Model-Based Rich Internet Applications Crawling: "Menu" and "Probability" Models.
J. Web Eng., 2014

Towards Real Time Contextual Advertising.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

PDist-RIA Crawler: A Peer-to-Peer Distributed Crawler for Rich Internet Applications.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

GDist-RIA Crawler: A Greedy Distributed Crawler for Rich Internet Applications.
Proceedings of the Networked Systems - Second International Conference, 2014

A Scalable P2P RIA Crawling System with Partial Knowledge.
Proceedings of the Networked Systems - Second International Conference, 2014

2013
Building Rich Internet Applications Models: Example of a Better Strategy.
Proceedings of the Web Engineering - 13th International Conference, 2013

A brief history of web crawlers.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A Statistical Approach for Efficient Crawling of Rich Internet Applications.
Proceedings of the Web Engineering - 12th International Conference, 2012

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

3rd Workshop on Smart Surveillance System Applications.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2012

Crawling rich internet applications: the state of the art.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2012

2011
A Strategy for Efficient Crawling of Rich Internet Applications.
Proceedings of the Web Engineering - 11th International Conference, 2011

2<sup>nd</sup> Workshop on Smart Surveillance System Applications.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
Some Modeling Challenges When Testing Rich Internet Applications for Security.
Proceedings of the Third International Conference on Software Testing, 2010

Y-Means: An Autonomous Clustering Algorithm.
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010

Smart surveillance system applications.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2008
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
A Feature Classification Scheme For Network Intrusion Detection.
Int. J. Netw. Secur., 2007

SVision: A novel visual network-anomaly identification technique.
Comput. Secur., 2007

Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Toward A Feature Classification Scheme For Network Intrusion Detection.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

2005
SVision: A Network Host-Centered Anomaly Visualization Technique.
Proceedings of the Information Security, 8th International Conference, 2005

2004
A novel visualization technique for network anomaly detection.
Proceedings of the Second Annual Conference on Privacy, 2004


  Loading...