Exploring the Attack Surface of Blockchain: A Comprehensive Survey M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ... IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020 | 544* | 2020 |
AMAL: High-fidelity, behavior-based automated malware analysis and classification A Mohaisen, O Alrawi, M Mohaisen Computer & Security, 2015 | 338* | 2015 |
XMSS: eXtended Merkle Signature Scheme A Hülsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen IETF rfc8391, 2018 | 257* | 2018 |
Measuring the Mixing Time of Social Graphs A Mohaisen, A Yun, Y Kim ACM IMC, 2010 | 240 | 2010 |
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions M Saad, J Choi, DH Nyang, J Kim, A Mohaisen IEEE Systems Journal 14 (1), 321-332, 2019 | 181 | 2019 |
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis A Wang, A Mohaisen, W Chang, S Chen IEEE/ACM Transactions on Networking (TON), 2018 | 181 | 2018 |
Detecting and classifying android malware using static analysis along with creator information H Kang, J Jang, A Mohaisen, HK Kim DSN, 2015 | 180 | 2015 |
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen IEEE Internet of Things Journal 8 (1), 65, 2021 | 167 | 2021 |
Keep your friends close: Incorporating trust into social network-based Sybil defenses A Mohaisen, N Hopper, Y Kim IEEE INFOCOM, 2011 | 157 | 2011 |
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman ACM CCS, 2010 | 151 | 2010 |
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones S Chen, K Ren, S Piao, C Wang, Q Wang, J Weng, L Su, A Mohaisen IEEE ICDCS, 2017 | 148 | 2017 |
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 141 | 2019 |
AV-Meter: An Evaluation of Antivirus Scans and Labels A Mohaisen, O Alrawi DIMVA, 112-131, 2014 | 139 | 2014 |
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang IEEE Internet of Things Journal 7 (6), 5008-5020, 2020 | 133 | 2020 |
A Survey on Deep Packet Inspection for Intrusion Detection Systems T AbuHmed, A Mohaisen, DH Nyang Telecommunication Magazine, 2008 | 130 | 2008 |
Unveiling Zeus: Automated classification of malware samples A Mohaisen, O Alrawi WWW, 2013 | 120 | 2013 |
Cooperative multiagent deep reinforcement learning for reliable surveillance via autonomous multi-UAV control WJ Yun, S Park, J Kim, MJ Shin, S Jung, DA Mohaisen, JH Kim IEEE Transactions on Industrial Informatics 18 (10), 7086-7096, 2022 | 117 | 2022 |
Large-Scale and Language-Oblivious Code Authorship Identification M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang ACM CCS, 101-114, 2018 | 115 | 2018 |
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic M Thomas, A Mohaisen WWW, 2014 | 111 | 2014 |
Android Malware Detection using Complex-Flows F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek IEEE TMC, 2018 | 106 | 2018 |