Leyla Bilge
Orcid: 0000-0002-8408-3741
According to our database1,
Leyla Bilge
authored at least 38 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments.
ACM Trans. Priv. Secur., May, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
2015
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
2012
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the Computer Security, 2009