Moheeb Abu Rajab
Moheeb Abu Rajab
Verified email at google.com
Title
Cited by
Cited by
Year
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
8962006
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6602008
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3322007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2652012
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
1222009
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1162015
On the Effectiveness of Distributed Worm Monitoring.
MA Rajab, F Monrose, A Terzis
USENIX Security Symposium, 15, 2005
1152005
CAMP: Content-agnostic malware protection
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
882013
The nocebo effect on the web: an analysis of fake anti-virus distribution
MA Rajab, L Ballard, P Marvrommatis, N Provos, X Zhao
812010
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
782008
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 579-593, 2015
742015
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report, 2011
742011
Investigating commercial pay-per-install and the distribution of unwanted software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 721-739, 2016
692016
Fast and evasive attacks: Highlighting the challenges ahead
MA Rajab, F Monrose, A Terzis
International Workshop on Recent Advances in Intrusion Detection, 206-225, 2006
442006
Requirements on worm mitigation technologies in MANETS
RG Cole, N Phamdo, MA Rajab, A Terzis
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 207-214, 2005
422005
On the impact of dynamic addressing on malware propagation
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 4th ACM workshop on Recurring malcode, 51-56, 2006
412006
Peeking through the cloud: DNS-based estimation and its applications
MA Rajab, F Monrose, A Terzis, N Provos
International Conference on Applied Cryptography and Network Security, 21-38, 2008
382008
Worm evolution tracking via timing analysis
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 2005 ACM workshop on Rapid malcode, 52-59, 2005
332005
Exploration system and method for analyzing behavior of binary executable programs
MA Rajab, X Zhao, N Provos
US Patent 9,215,245, 2015
122015
Peeking through the cloud: Client density estimation via dns cache probing
MA Rajab, F Monrose, N Provos
ACM Transactions on Internet Technology (TOIT) 10 (3), 1-21, 2010
112010
The system can't perform the operation now. Try again later.
Articles 1–20