What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Aziz Mohaisen
Google Scholar
ORCID:
0000-0003-3227-2505
43
publications in security and cryptology related venues
Year
Venue
Title
2019
conf/cns
Fighting Fake News Propagation with Blockchains.
Muhammad Saad
Ashar Ahmad
Aziz Mohaisen
2019
conf/wisa
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Jeman Park
Aziz Mohaisen
Charles A. Kamhoua
Michael J. Weisman
Nandi O. Leslie
Laurent Njilla
2019
conf/icbc2
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Muhammad Saad
Laurent Njilla
Charles A. Kamhoua
Joongheon Kim
DaeHun Nyang
Aziz Mohaisen
2019
conf/icbc2
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Muhammad Saad
Afsah Anwar
Ashar Ahmad
Hisham Alasmary
Murat Yuksel
Aziz Mohaisen
2019
conf/dsn
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Jeman Park
Aminollah Khormali
Manar Mohaisen
Aziz Mohaisen
2019
conf/dsn
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.
Joohyung Jeon
Junhui Kim
Joongheon Kim
Kwangsoo Kim
Aziz Mohaisen
Jong-Kook Kim
2019
conf/wisec
Analyzing endpoints in the internet of things malware: poster.
Jinchun Choi
Afsah Anwar
Hisham Alasmary
Jeffrey Spaulding
DaeHun Nyang
Aziz Mohaisen
2019
conf/wisec
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Ahmed Abusnaina
Aminollah Khormali
Hisham Alasmary
Jeman Park
Afsah Anwar
Ulku Meteriz
Aziz Mohaisen
2019
conf/wisec
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Rhongho Jang
Seongkwang Moon
Youngtae Noh
Aziz Mohaisen
DaeHun Nyang
2018
journals/compsec
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
DaeHun Nyang
Hyoungshick Kim
Woojoo Lee
Sung-bae Kang
Geumhwan Cho
Mun-Kyu Lee
Aziz Mohaisen
2018
conf/ccs
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Muhammad Saad
My T. Thai
Aziz Mohaisen
2018
conf/ccs
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Afsah Anwar
Aminollah Khormali
Aziz Mohaisen
2018
conf/ccs
Large-Scale and Language-Oblivious Code Authorship Identification.
Mohammed Abuhamad
Tamer AbuHmed
Aziz Mohaisen
DaeHun Nyang
2018
conf/ndss
ABC: Enabling Smartphone Authentication with Built-in Camera.
Zhongjie Ba
Sixu Piao
Xinwen Fu
Dimitrios Koutsonikolas
Aziz Mohaisen
Kui Ren
2017
journals/tifs
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
Hyukmin Kwon
Aziz Mohaisen
Jiyoung Woo
Yongdae Kim
Eunjo Lee
Huy Kang Kim
2017
conf/fc
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Qian Wang
Kui Ren
Minxin Du
Qi Li
Aziz Mohaisen
2017
conf/wisec
Two-level network monitoring and management in WLAN using software-defined networking: poster.
RhongHo Jang
DongGyu Cho
Aziz Mohaisen
Youngtae Noh
DaeHun Nyang
2017
conf/wisec
Highly-accurate rogue access point detection using intentional channel interference: poster.
RhongHo Jang
Jeonil Kang
Aziz Mohaisen
DaeHun Nyang
2016
journals/compsec
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Jae-wook Jang
Hyun-Jae Kang
Jiyoung Woo
Aziz Mohaisen
Huy Kang Kim
2016
conf/cns
A user study of the effectiveness of typosquatting techniques.
Jeffrey Spaulding
Ah Reum Kang
Shambhu J. Upadhyaya
Aziz Mohaisen
2016
conf/cns
WHAP: Web-hacking profiling using Case-Based Reasoning.
Mee Lan Han
Hee Chan Han
Ah Reum Kang
Byung Il Kwak
Aziz Mohaisen
Huy Kang Kim
2016
conf/cns
Transparency of the new gTLD's centralized zone data service: A measurement study.
Ah Reum Kang
Aziz Mohaisen
2016
conf/cns
Assessing DNS privacy under partial deployment of special-use Domain Names.
Ah Reum Kang
Aziz Mohaisen
2016
conf/cns
Automatic alerts annotation for improving DDoS mitigation systems.
Ah Reum Kang
Aziz Mohaisen
2016
conf/wisa
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Aziz Mohaisen
Ah Reum Kang
Kui Ren
2016
conf/wisa
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
An Wang
Aziz Mohaisen
Wentao Chang
Songqing Chen
2016
conf/ndss
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Eunjo Lee
Jiyoung Woo
Hyoungshick Kim
Aziz Mohaisen
Huy Kang Kim
2015
journals/compsec
AMAL: High-fidelity, behavior-based automated malware analysis and classification.
Aziz Mohaisen
Omar Alrawi
Manar Mohaisen
2015
journals/compsec
Transaction authentication using complementary colors.
YoungJae Maeng
Aziz Mohaisen
Mun-Kyu Lee
DaeHun Nyang
2015
conf/ccs
Measuring Botnets in the Wild: Some New Trends.
Wentao Chang
Aziz Mohaisen
An Wang
Songqing Chen
2015
conf/cns
Separation of benign and malicious network events for accurate malware family classification.
Hesham Mekky
Aziz Mohaisen
Zhi-Li Zhang
2015
conf/dsn
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
An Wang
Aziz Mohaisen
Wentao Chang
Songqing Chen
2014
conf/ccs
POSTER: How Distributed Are Today's DDoS Attacks?
An Wang
Wentao Chang
Aziz Mohaisen
Songqing Chen
2014
conf/ccs
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Hesham Mekky
Aziz Mohaisen
Zhi-Li Zhang
2014
conf/cns
Chatter: Classifying malware families using system event ordering.
Aziz Mohaisen
Andrew G. West
Allison Mankin
Omar Alrawi
2014
conf/wisa
ADAM: Automated Detection and Attribution of Malicious Webpages.
Ahmed E. Kosba
Aziz Mohaisen
Andrew G. West
Trevor Tonn
Huy Kang Kim
2014
conf/wisa
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction.
Aziz Mohaisen
Mansurul Bhuiyan
Yannis Labrou
2014
conf/wisa
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.
Aziz Mohaisen
Omar Alrawi
2013
conf/cns
ADAM: Automated detection and attribution of malicious webpages.
Ahmed E. Kosba
Aziz Mohaisen
Andrew G. West
Trevor Tonn
2013
conf/cns
Babble: Identifying malware by its dialects.
Aziz Mohaisen
Omar Alrawi
Andrew G. West
Allison Mankin
2013
conf/cns
Characterization of the dynamics and interactions of domain names and name server.
Mansurul Bhuiyan
Aziz Mohaisen
Yannis Labrou
Mohammad Al Hasan
2013
conf/wisa
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Aziz Mohaisen
Omar Alrawi
Matt Larson
Danny McPherson
2013
conf/wisa
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.
Aziz Mohaisen
Scott Hollenbeck
Coauthors
Afsah Anwar
(4)
Ah Reum Kang
(6)
Ahmed Abusnaina
(1)
Ahmed E. Kosba
(2)
Allison Mankin
(2)
Aminollah Khormali
(3)
An Wang
(4)
Andrew G. West
(4)
Ashar Ahmad
(2)
Aziz Mohaisen
(43)
Byung Il Kwak
(1)
Charles A. Kamhoua
(2)
DaeHun Nyang
(8)
Danny McPherson
(1)
Dimitrios Koutsonikolas
(1)
DongGyu Cho
(1)
Eunjo Lee
(2)
Geumhwan Cho
(1)
Hee Chan Han
(1)
Hesham Mekky
(2)
Hisham Alasmary
(3)
Huy Kang Kim
(5)
Hyoungshick Kim
(2)
Hyukmin Kwon
(1)
Hyun-Jae Kang
(1)
Jae-wook Jang
(1)
Jeffrey Spaulding
(2)
Jeman Park
(3)
Jeonil Kang
(1)
Jinchun Choi
(1)
Jiyoung Woo
(3)
Jong-Kook Kim
(1)
Joohyung Jeon
(1)
Joongheon Kim
(2)
Junhui Kim
(1)
Kui Ren
(3)
Kwangsoo Kim
(1)
Laurent Njilla
(2)
Manar Mohaisen
(2)
Mansurul Bhuiyan
(2)
Matt Larson
(1)
Mee Lan Han
(1)
Michael J. Weisman
(1)
Minxin Du
(1)
Mohammad Al Hasan
(1)
Mohammed Abuhamad
(1)
Muhammad Saad
(4)
Mun-Kyu Lee
(2)
Murat Yuksel
(1)
My T. Thai
(1)
Nandi O. Leslie
(1)
Omar Alrawi
(5)
Qi Li
(1)
Qian Wang
(1)
Rhongho Jang
(3)
Scott Hollenbeck
(1)
Seongkwang Moon
(1)
Shambhu J. Upadhyaya
(1)
Sixu Piao
(1)
Songqing Chen
(4)
Sung-bae Kang
(1)
Tamer Abuhmed
(1)
Trevor Tonn
(2)
Ulku Meteriz
(1)
Wentao Chang
(4)
Woojoo Lee
(1)
Xinwen Fu
(1)
Yannis Labrou
(2)
Yongdae Kim
(1)
YoungJae Maeng
(1)
Youngtae Noh
(2)
Zhi-Li Zhang
(2)
Zhongjie Ba
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to