David Mohaisen
Orcid: 0000-0003-3227-2505Affiliations:
- University of Central Florida, Department of Computer Science, Orlando, FL, USA
- State University of New York at Buffalo, Buffalo, NY, USA (former)
- University of Minnesota, Minneapolis, MN, USA (former, PhD 2012)
- Inha University, Information Security Research Laboratory, Incheon, South Korea (former)
According to our database1,
David Mohaisen
authored at least 308 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.ucf.edu
-
on orcid.org
-
on mohaisen.me
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Dataset, June, 2024
Dataset, May, 2024
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw., February, 2024
Hierarchical Deep Reinforcement Learning-Based Propofol Infusion Assistant Framework in Anesthesia.
IEEE Trans. Neural Networks Learn. Syst., February, 2024
Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy Perspective.
IEEE Trans. Mob. Comput., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis.
CoRR, 2024
Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
CoRR, 2024
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction.
Comput. Networks, April, 2023
Improving the Social Connectivity in Engineering Educational Networks and Implications.
IEEE Trans. Educ., February, 2023
Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications.
IEEE Trans. Intell. Transp. Syst., January, 2023
Exploration of Bitflip's Effect on Deep Neural Network Accuracy in Plaintext and Ciphertext.
IEEE Micro, 2023
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations.
CoRR, 2023
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023
Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Knowl. Data Eng., 2022
Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Syst. J., 2022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis.
CoRR, 2022
CoRR, 2022
Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
CoRR, 2022
Comput. Networks, 2022
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022
WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
ACM Trans. Priv. Secur., 2021
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Computers, 2021
J. Netw. Comput. Appl., 2021
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021
IET Blockchain, 2021
IACR Cryptol. ePrint Arch., 2021
Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing.
Frontiers Big Data, 2021
CoRR, 2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021
A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021
Comput. Networks, 2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021
SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning.
Proceedings of the SIGSPATIAL '21: 29th International Conference on Advances in Geographic Information Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020
EAI Endorsed Trans. Security Safety, 2020
Proc. Priv. Enhancing Technol., 2020
Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching.
J. Commun. Networks, 2020
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020
CoRR, 2020
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Trans. Mob. Comput., 2019
J. Netw. Comput. Appl., 2019
Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019
Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters.
CoRR, 2019
You Can Run, But You Cannot Hide: Using Elevation Profiles to Breach Location Privacy through Trajectory Prediction.
CoRR, 2019
CoRR, 2019
CoRR, 2019
CoRR, 2019
CoRR, 2019
CoRR, 2019
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE/ACM Trans. Netw., 2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018
Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.
Sensors, 2018
Comput. Secur., 2018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Int. J. Distributed Sens. Networks, 2017
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017
Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
KSII Trans. Internet Inf. Syst., 2016
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
Smart Comput. Rev., 2015
Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms.
Multim. Tools Appl., 2015
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015
Comput. Secur., 2015
Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Separation of benign and malicious network events for accurate malware family classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Serv. Comput., 2014
Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
IEEE Commun. Lett., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Veh. Technol., 2013
IEEE Trans. Dependable Secur. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011
CoRR, 2011
CoRR, 2011
Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010
CoRR, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
KSII Trans. Internet Inf. Syst., 2009
KSII Trans. Internet Inf. Syst., 2009
Int. J. Netw. Secur., 2009
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008
A computationally-efficient construction for the matrix-based key distribution in sensor network
CoRR, 2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006