关注
David Mohaisen
David Mohaisen
其他姓名David A Mohaisen, Aziz Mohaisen
Professor of Computer Science, University of Central Florida
在 ucf.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
407*2020
AMAL: High-fidelity, behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Mohaisen
Computer & Security, 2015
300*2015
Measuring the Mixing Time of Social Graphs
A Mohaisen, A Yun, Y Kim
ACM IMC, 2010
2382010
Detecting and classifying android malware using static analysis along with creator information
H Kang, J Jang, A Mohaisen, HK Kim
DSN, 2015
1662015
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis
A Wang, A Mohaisen, W Chang, S Chen
IEEE/ACM Transactions on Networking (TON), 2018
1642018
XMSS: eXtended Merkle Signature Scheme
A Hülsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen
IETF rfc8391, 2018
1622018
Keep your friends close: Incorporating trust into social network-based Sybil defenses
A Mohaisen, N Hopper, Y Kim
IEEE INFOCOM, 2011
1522011
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
ACM CCS, 2010
1462010
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
1382019
AV-Meter: An Evaluation of Antivirus Scans and Labels
A Mohaisen, O Alrawi
DIMVA, 112-131, 2014
1282014
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
S Chen, K Ren, S Piao, C Wang, Q Wang, J Weng, L Su, A Mohaisen
IEEE ICDCS, 2017
1252017
A Survey on Deep Packet Inspection for Intrusion Detection Systems
T AbuHmed, A Mohaisen, DH Nyang
Telecommunication Magazine, 2008
1202008
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65, 2021
1192021
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1102019
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic
M Thomas, A Mohaisen
WWW, 2014
1072014
Unveiling Zeus: Automated classification of malware samples
A Mohaisen, O Alrawi
WWW, 2013
1042013
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
962020
Large-Scale and Language-Oblivious Code Authorship Identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
ACM CCS, 101-114, 2018
932018
Android Malware Detection using Complex-Flows
F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek
IEEE TMC, 2018
892018
Countering Selfish Mining in Blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
International Conference on Computing, Networking and Communications (ICNC 2019), 2019
772019
系统目前无法执行此操作,请稍后再试。
文章 1–20