What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sumayah A. Alrwais
Google Scholar
13
publications in security and cryptology related venues
Year
Venue
Title
2019
conf/uss
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Arman Noroozian
Jan Koenders
Eelco van Veldhuizen
Carlos Hernandez Gañán
Sumayah A. Alrwais
Damon McCoy
Michel van Eeten
2019
conf/sp
Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Xianghang Mi
Xuan Feng
Xiaojing Liao
Baojun Liu
XiaoFeng Wang
Feng Qian
Zhou Li
Sumayah A. Alrwais
Limin Sun
Ying Liu
2019
conf/eurosp
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu
Zhou Li
Peiyuan Zong
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Sumayah A. Alrwais
XiaoFeng Wang
Shuang Hao
Yaoqi Jia
Yiming Zhang
Kai Chen
Zaifeng Zhang
2019
conf/ndss
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Eihal Alowaisheq
Peng Wang
Sumayah A. Alrwais
Xiaojing Liao
XiaoFeng Wang
Tasneem Alowaisheq
Xianghang Mi
Siyuan Tang
Baojun Liu
2017
conf/sp
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Sumayah A. Alrwais
Xiaojing Liao
Xianghang Mi
Peng Wang
Xiaofeng Wang
Feng Qian
Raheem A. Beyah
Damon McCoy
2016
conf/ccs
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Xiaojing Liao
Sumayah A. Alrwais
Kan Yuan
Luyi Xing
XiaoFeng Wang
Shuang Hao
Raheem A. Beyah
2016
conf/sp
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhongyu Pei
Hao Yang
Jianjun Chen
Hai-Xin Duan
Kun Du
Eihal Alowaisheq
Sumayah A. Alrwais
Luyi Xing
Raheem A. Beyah
2016
conf/acsac
Catching predators at watering holes: finding and understanding strategically compromised websites.
Sumayah A. Alrwais
Kan Yuan
Eihal Alowaisheq
Xiaojing Liao
Alina Oprea
XiaoFeng Wang
Zhou Li
2015
conf/dsn
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Alina Oprea
Zhou Li
Ting-Fang Yen
Sang H. Chin
Sumayah A. Alrwais
2014
conf/uss
Understanding the Dark Side of Domain Parking.
Sumayah A. Alrwais
Kan Yuan
Eihal Alowaisheq
Zhou Li
XiaoFeng Wang
2014
conf/sp
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
Zhou Li
Sumayah A. Alrwais
XiaoFeng Wang
Eihal Alowaisheq
2013
conf/sp
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Zhou Li
Sumayah A. Alrwais
Yinglian Xie
Fang Yu
XiaoFeng Wang
2012
conf/acsac
Dissecting ghost clicks: ad fraud via misdirected human clicks.
Sumayah A. Alrwais
Alexandre Gerber
Christopher W. Dunn
Oliver Spatscheck
Minaxi Gupta
Eric Osterweil
Coauthors
Alexandre Gerber
(1)
Alina Oprea
(2)
Arman Noroozian
(1)
Baojun Liu
(3)
Carlos Hernandez Gañán
(1)
Chaoyi Lu
(1)
Christopher W. Dunn
(1)
Damon McCoy
(2)
Eelco van Veldhuizen
(1)
Eihal Alowaisheq
(5)
Eric Osterweil
(1)
Fang Yu
(1)
Feng Qian
(2)
Hai-Xin Duan
(2)
Hao Yang
(1)
Jan Koenders
(1)
Jianjun Chen
(1)
Kai Chen
(1)
Kan Yuan
(4)
Kun Du
(1)
Limin Sun
(1)
Luyi Xing
(2)
Michel van Eeten
(1)
Minaxi Gupta
(1)
Oliver Spatscheck
(1)
Peiyuan Zong
(1)
Peng Wang
(2)
Raheem A. Beyah
(3)
Sang H. Chin
(1)
Shuang Hao
(2)
Siyuan Tang
(1)
Sumayah A. Alrwais
(13)
Tasneem Alowaisheq
(1)
Ting-Fang Yen
(1)
Xianghang Mi
(3)
Xiaofeng Wang
(1)
XiaoFeng Wang
(9)
Xiaojing Liao
(6)
Xuan Feng
(1)
Yaoqi Jia
(1)
Yiming Zhang
(1)
Ying Liu
(2)
Yinglian Xie
(1)
Zaifeng Zhang
(1)
Zhongyu Pei
(1)
Zhou Li
(7)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to