Yazan Boshmaf
Orcid: 0000-0002-0816-6924
According to our database1,
Yazan Boshmaf
authored at least 28 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2020
Comput. Secur., 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
2018
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis.
CoRR, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2016
Pervasive Mob. Comput., 2016
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs.
Comput. Secur., 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the 16th Eurographics Symposium on Parallel Graphics and Visualization, 2016
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
2013
Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments.
ACM Trans. Auton. Adapt. Syst., 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012
2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
2009
Proc. VLDB Endow., 2009