David Mohaisen
Title
Cited by
Cited by
Year
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
ACM Internet Measurements Conference (IMC), 2010
1982010
AMAL: High-fidelity, behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Mohaisen
Computer & Security, 2015
1322015
Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
The 30th IEEE Conference on Computer Communications (INFOCOM), 2011
132*2011
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
ACM conference on Computer and communications security (CCS), 2010
1122010
Detecting and classifying android malware using static analysis along with creator information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks (IJDSN), 2015
1022015
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
852008
XMSS: eXtended Merkle Signature Scheme
A Huelsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen
IETF -- RFC 8391, 2018
84*2018
Av-meter: An evaluation of antivirus scans and labels
A Mohaisen, O Alrawi
International conference on detection of intrusions and malware, and …, 2014
842014
Delving into internet DDoS attacks by botnets: characterization and analysis
A Wang, A Mohaisen, W Chang, S Chen
EEE/ACM Transactions on Networking (TON), 2018
782018
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic
M Thomas, A Mohaisen
International conference on World Wide Web (WWW), 2014
762014
Unveiling zeus: automated classification of malware samples
A Mohaisen, O Alrawi
International conference on World Wide Web (WWW), 2013
692013
Protecting access privacy of cached contents in information centric networks
A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim
ACM symposium on Information, computer and communications security (ASIACCS …, 2013
612013
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
T Zhu, A Mohaisen, Y Ping, D Towsley
IEEE International Conference on Computer Communications (INFOCOM), 2012
582012
Trustworthy distributed computing on social networks
A Mohaisen, H Tran, A Chandra, Y Kim
IEEE Transactions on Services Computing (TSC), 2014
52*2014
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
S Chen, K Ren, S Piao, C Wang, Q Wang, J Weng, L Su, A Mohaisen
The 37th International Conference on Distributed Computing Systems (ICDCS), 2017
432017
Measuring botnets in the wild: Some new trends
W Chang, A Mohaisen, A Wang, S Chen
ACM Symposium on Computer and Communications Security (ASIACCS), 2015
432015
Keylogging-resistant Visual Authentication Protocols
D Nyang, A Mohaisen, J Kang
IEEE Transactions on Mobile Computing (TMC), 2014
432014
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Elsevier Computers & Security 58, 125-138, 2016
382016
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
382016
Timing attacks on access privacy in information centric networks and countermeasures
A Mohaisen, H Mekky, X Zhang, H Xie, Y Kim
IEEE Transactions on Dependable and Secure Computing (TDSC), 2015
382015
The system can't perform the operation now. Try again later.
Articles 1–20