Afsah Anwar

Orcid: 0000-0003-1449-3590

According to our database1, Afsah Anwar authored at least 35 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw., February, 2024

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

2022
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput., 2022

DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022

<i>RouteChain</i>: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks, 2022

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality.
IACR Cryptol. ePrint Arch., 2021

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR, 2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018


  Loading...