Natalia Stakhanova

Orcid: 0000-0003-1923-319X

According to our database1, Natalia Stakhanova authored at least 68 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence.
IEEE Trans. Netw. Serv. Manag., June, 2024

Authenticated Range Querying of Historical Blockchain Healthcare Data Using Authenticated Multi-Version Index.
Distributed Ledger Technol. Res. Pract., June, 2024

Measuring and Characterizing (Mis)compliance of the Android Permission System.
IEEE Trans. Software Eng., April, 2024

EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum.
ACM Trans. Internet Techn., February, 2024

Large Language Model vs. Stack Overflow in Addressing Android Permission Related Challenges.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Adversarial Analysis of Software Composition Analysis Tools.
Proceedings of the Information Security - 27th International Conference, 2024

Decoding Android Permissions: A Study of Developer Challenges and Solutions on Stack Overflow.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024

Navigating (in)Security of AI-Generated Code.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023

Dataset Characteristics for Reliable Code Authorship Attribution.
IEEE Trans. Dependable Secur. Comput., 2023

Data Provenance in Security and Privacy.
ACM Comput. Surv., 2023

Investigating Software Developers' Challenges for Android Permissions in Stack Overflow.
CoRR, 2023

Certificate Reuse in Android Applications.
Proceedings of the Information Security - 26th International Conference, 2023

Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Exploiting Android Browser.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022

Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices.
ACM Trans. Internet Techn., 2022

Language and Platform Independent Attribution of Heterogeneous Code.
Proceedings of the Security and Privacy in Communication Networks, 2022

HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Authenticated Multi-Version Index for Blockchain-based Range Queries on Historical Data.
Proceedings of the IEEE International Conference on Blockchain, 2022

Analysis and prediction of web proxies misbehavior.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Github Dataset for Authorship Attribution.
Dataset, October, 2021

De-anonymizing Ethereum blockchain smart contracts through code attribution.
Int. J. Netw. Manag., 2021

Origin Attribution of RSA Public Keys.
Proceedings of the Security and Privacy in Communication Networks, 2021

EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Towards Eidetic Blockchain Systems with Enhanced Provenance.
Proceedings of the 36th IEEE International Conference on Data Engineering Workshops, 2020

2019
Code Authorship Attribution: Methods and Challenges.
ACM Comput. Surv., 2019

Adversarial Authorship Attribution in Open-Source Projects.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Exploring Ethereum's Blockchain Anonymity Using Smart Contract Code Attribution.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Scalable Privacy-Preserving Query Processing over Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges.
J. Cyber Secur. Mobil., 2018

Unmasking Android Obfuscation Tools Using Spatial Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Authorship Attribution of Android Apps.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Android authorship attribution through string analysis.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017

2016
Measuring code reuse in Android apps.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Detecting Malicious URLs Using Lexical Analysis.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Android Botnets: What URLs are Telling Us.
Proceedings of the Network and System Security - 9th International Conference, 2015

An Entropy Based Encrypted Traffic Classifier.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Exploring reverse engineering symptoms in Android apps.
Proceedings of the Eighth European Workshop on System Security, 2015

Enriching reverse engineering through visual exploration of Android binaries.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
DroidKin: Lightweight Detection of Android Apps Similarity.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards effective feature selection in machine learning-based botnet detection approaches.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Probing the Limits of Virtualized Software Protection.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
Detecting machine-morphed malware variants via engine attribution.
J. Comput. Virol. Hacking Tech., 2013

2012
Towards cost-sensitive assessment of intrusion response selection.
J. Comput. Secur., 2012

2011
Exploring network-based malware classification.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

2010
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.
IEEE Trans. Syst. Man Cybern. Part C, 2010

On the symbiosis of specification-based and anomaly-based detection.
Comput. Secur., 2010

Selective Regular Expression Matching.
Proceedings of the Information Security - 13th International Conference, 2010

Managing intrusion detection rule sets.
Proceedings of the Third European Workshop on System Security, 2010

An Online Adaptive Approach to Alert Correlation.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
A Framework for Cost Sensitive Assessment of Intrusion Response Selection.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Intrusion response cost assessment methodology.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
On Evaluation of Response Cost for Intrusion Response Systems.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A Behavioral Model of Ideologically-motivated "Snowball" Attacks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A taxonomy of intrusion response systems.
Int. J. Inf. Comput. Secur., 2007

Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems.
Int. J. Inf. Comput. Secur., 2007

Specification Synthesis for Monitoring and Analysis of MANET Protocols.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Cost-Sensitive Model for Preemptive Intrusion Response Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
A Reputation-based Trust Management in Peer-to-Peer Network Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004


  Loading...