Mobin Javed

Orcid: 0000-0002-1321-1988

According to our database1, Mobin Javed authored at least 31 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Investigating Phishing Threats in the Email Browsing Experience of Visually Impaired Individuals.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Deepfake Text Detection: Limitations and Opportunities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

"Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Training Users to Recognize Persuasion Techniques in Vishing Calls.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
"Ask this from the person who has private stuff": Privacy Perceptions, Behaviours and Beliefs Beyond W.E.I.R.D.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Deepfake Videos in the Wild: Analysis and Detection.
Proceedings of the WWW '21: The Web Conference 2021, 2021

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification.
Proceedings of the 30th USENIX Security Symposium, 2021

Designing Parental Monitoring and Control Technology: A Systematic Review.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

2020
Using application layer banner data to automatically identify IoT devices.
Comput. Commun. Rev., 2020

2018
Exploring Server-side Blocking of Regions.
CoRR, 2018

Scanning the Internet for Liveness.
Comput. Commun. Rev., 2018

A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

2017
Detecting Credential Spearphishing in Enterprise Settings.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Detecting Credential Compromise in Enterprise Networks.
PhD thesis, 2016

The Adblocking Tug-of-War.
login Usenix Mag., 2016

Towards Mining Latent Client Identifiers from Network Traffic.
Proc. Priv. Enhancing Technol., 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race.
CoRR, 2016

Adblocking and Counter Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Measurement and Analysis of Traffic Exchange Services.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Information theoretic feature space slicing for statistical anomaly detection.
J. Netw. Comput. Appl., 2014

A Look at the Consequences of Internet Censorship Through an ISP Lens.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

Detecting stealthy, distributed SSH brute-forcing.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Designing a cluster-based covert channel to evade disk investigation and forensics.
Comput. Secur., 2011

2010
An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems.
Proceedings of IEEE International Conference on Communications, 2010

2009
On the Inefficient Use of Entropy for Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A survey of quantum key distribution protocols.
Proceedings of the FIT '09, 2009


  Loading...