When push comes to ads: Measuring the rise of (malicious) push advertising K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci Proceedings of the ACM Internet Measurement Conference, 724-737, 2020 | 31 | 2020 |
Graalf: Supporting graphical analysis of audit logs for forensics O Setayeshfar, C Adkins, M Jones, KH Lee, P Doshi Software Impacts 8, 100068, 2021 | 22 | 2021 |
Droidforensics: Accurate reconstruction of android attacks via multi-layer forensic logging X Yuan, O Setayeshfar, H Yan, P Panage, X Wei, KH Lee Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 16 | 2017 |
Spatio-temporal coverage enhancement in drive-by sensing through utility-aware mobile agent selection NH Tonekaboni, L Ramaswamy, D Mishra, O Setayeshfar, S Omidvar Internet of Things-ICIOT 2020: 5th International Conference, Held as Part of …, 2020 | 15 | 2020 |
A novel AI-based methodology for identifying cyber attacks in honey pots M AbuOdeh, C Adkins, O Setayeshfar, P Doshi, KH Lee Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 15224 …, 2021 | 8 | 2021 |
ChatterHub: Privacy invasion via smart home hub O Setayeshfar, K Subramani, X Yuan, R Dey, D Hong, KH Lee, IK Kim 2021 IEEE International Conference on Smart Computing (SMARTCOMP), 181-188, 2021 | 7 | 2021 |
Cyber attack intent recognition and active deception using factored interactive pomdps A Shinde, P Doshi, O Setayeshfar Proceedings of the 20th International Conference on Autonomous Agents and …, 2021 | 7 | 2021 |
Path-based program lineage inference analysis J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar US Patent 10,853,487, 2020 | 5 | 2020 |
Privacy invasion via smart-home hub in personal area networks O Setayeshfar, K Subramani, X Yuan, R Dey, D Hong, IK Kim, KH Lee Pervasive and Mobile Computing 85, 101675, 2022 | 1 | 2022 |
Automated software safeness categorization with installation lineage and hybrid information sources J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar US Patent 10,929,539, 2021 | | 2021 |
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races O Setayeshfar, JJ Rhee, CH Kim, KH Lee Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | | 2021 |
Towards a Non-Discriminatory Security Model Through Analysis of Low Level Data O Setayeshfar University of Georgia, 2021 | | 2021 |
When Push Comes to Ads K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci Proceedings of the ACM Internet Measurement Conference, 2020 | | 2020 |
Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent A Shinde, P Doshi, O Setayeshfar arXiv preprint arXiv:2007.09512, 2020 | | 2020 |