Yacin Nadji

Affiliations:
  • Georgia Institute of Technology, Atlanta, USA


According to our database1, Yacin Nadji authored at least 19 papers between 2009 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Still Beheading Hydras: Botnet Takedowns Then and Now.
IEEE Trans. Dependable Secur. Comput., 2017

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017

Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet.
Comput. Secur., 2017

Towards designing effective visualizations for DNS-based network threat analysis.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Measuring Network Reputation in the Ad-Bidding Process.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Practical Attacks Against Graph-based Clustering.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Enabling Network Security Through Active DNS Datasets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Understanding the Privacy Implications of ECS - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2014
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Just awful enough: the functional dysfunction of the something awful forums.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Connected Colors: Unveiling the Structure of Criminal Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Beheading hydras: performing effective botnet takedowns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
MalwareVis: entity-based visualization of malware network traces.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Automated remote repair for mobile malware.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2009
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Proceedings of the Network and Distributed System Security Symposium, 2009


  Loading...