Ali Zand

According to our database1, Ali Zand authored at least 13 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Avoiding Generative Model Writer's Block With Embedding Nudging.
CoRR, 2024

2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2017
Demystifying DDoS as a Service.
IEEE Commun. Mag., 2017

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POISED: Spotting Twitter Spam Off the Beaten Paths.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Extracting probable command and control signatures for detecting botnets.
Proceedings of the Symposium on Applied Computing, 2014

Rippler: Delay injection for service dependency detection.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2011
Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Nexat: a history-based approach to predict attacker actions.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...