Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks B Rahbarinia, R Perdisci, M Antonakakis 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 131 | 2015 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013 | 80 | 2013 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Journal of Information Security and Applications 19 (3), 194-208, 2014 | 65 | 2014 |
Measuring and detecting malware downloads in live network traffic P Vadrevu, B Rahbarinia, R Perdisci, K Li, M Antonakakis Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 59 | 2013 |
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ... NDSS 122, 132, 2018 | 58 | 2018 |
Efficient and accurate behavior-based tracking of malware-control domains in large ISP networks B Rahbarinia, R Perdisci, M Antonakakis ACM Transactions on Privacy and Security (TOPS) 19 (2), 1-31, 2016 | 50 | 2016 |
Real-time detection of malware downloads via large-scale URL-> file-> machine graph mining B Rahbarinia, M Balduzzi, R Perdisci Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 31 | 2016 |
Exploring the long tail of (malicious) software downloads B Rahbarinia, M Balduzzi, R Perdisci 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 27 | 2017 |
System and method for protecting computer against remote malware downloads M Balduzzi, B Rahbarinia, R Perdisci US Patent 10,057,279, 2018 | 23 | 2018 |
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. P Vadrevu, J Liu, B Li, B Rahbarinia, KH Lee, R Perdisci NDSS, 2017 | 18 | 2017 |
{SinkMiner}: Mining Botnet Sinkholes for Fun and Profit B Rahbarinia, R Perdisci, M Antonakakis, D Dagon 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013 | 15 | 2013 |
A multi-objective scheme to hide sequential patterns B Rahbarinia, MM Pedram, HR Arabnia, Z Alavi 2010 The 2nd International Conference on Computer and Automation Engineering …, 2010 | 12 | 2010 |
Augmenting telephone spam blacklists by mining large cdr datasets J Liu, B Rahbarinia, R Perdisci, H Du, L Su Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 10 | 2018 |
Behavioral analysis of network traffic for detecting advanced cyber-threats B Rahbarinia University of Georgia, 2015 | 2 | 2015 |
An Efficient Two-Layer Classification Approach for Hyperspectral Images S Dinc, B Rahbarinia, L Cueva-Parra Machine Learning and Data Mining in Pattern Recognition: 14th International …, 2018 | 1 | 2018 |
EMOSS: An Efficient Algorithm to Hide Sequential Patterns O Behbahani, MM Pedram, K Badie, B Rahbarinia IJICTR (International Journal Of Information & Communication Technology …, 2015 | 1 | 2015 |
1st Deep Learning and Security Workshop N Vasiloglou, R Perdisci, B Rahbarinia, A Gardner, D Song, I Goodfellow, ... | | |