Filter
Conference contribution

Search results

  • 2023

    Do Content Management Systems Impact the Security of Free Content Websites?

    Alqadhi, M., Alabduljabbar, A., Thomas, K., Salem, S., Nyang, D. H. & Mohaisen, D., 2023, Computational Data and Social Networks - 11th International Conference, CSoNet 2022, Proceedings. Dinh, T. N. & Li, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 141-154 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System

    Kim, H. & Doh, I., 2023, 37th International Conference on Information Networking, ICOIN 2023. IEEE Computer Society, p. 312-317 6 p. (International Conference on Information Networking; vol. 2023-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors

    Choi, S., Mohaisen, M., Nyang, D. & Mohaisen, D., 2023, Information and Communications Security - 25th International Conference, ICICS 2023, Proceedings. Wang, D., Liu, Z., Yung, M. & Chen, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 399-417 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14252 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • TLS Goes Low Cost: When TLS Meets Edge

    Kim, I., Susilo, W., Baek, J., Kim, J. & Chow, Y. W., 2023, Information Security Applications - 23rd International Conference, WISA 2022, Revised Selected Papers. You, I. & Youn, T-Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 102-113 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13720 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    A Scalable and Dynamic ACL System for In-Network Defense

    Jung, C., Kim, S., Jang, R., Mohaisen, D. & Nyang, D. H., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1679-1693 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows

    Dao, D. N., Jang, R., Jung, C., Mohaisen, D. & Nyang, D. H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 331-342 12 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts

    Omar, M., Choi, S., Nyang, D. & Mohaisen, D., 30 May 2022, CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences. Association for Computing Machinery, Inc, p. 3-9 7 p. (CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R. H., Nyang, D. H. & Mohaisen, D., 26 Oct 2022, Proceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022. Association for Computing Machinery, p. 308-320 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Trojan Attacks and Defense for Speech Recognition

    Zong, W., Chow, Y. W., Susilo, W. & Kim, J., 2022, Mobile Internet Security - 5th International Symposium, MobiSec 2021, Revised Selected Papers. You, I., Kim, H., Youn, T-Y., Palmieri, F. & Kotenko, I. (eds.). Springer Science and Business Media Deutschland GmbH, p. 195-210 16 p. (Communications in Computer and Information Science; vol. 1544 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 7 Feb 2021, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. 9370392. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Nyang, D. & Mohaisen, D., 19 Apr 2021, The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021. Association for Computing Machinery, Inc, p. 508-515 8 p. (The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement

    Kim, D., Doh, I. & Chae, K., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 828-832 5 p. 9333932. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • P2DPI: Practical and Privacy-Preserving Deep Packet Inspection

    Kim, J., Camtepe, S., Baek, J., Susilo, W., Pieprzyk, J. & Nepal, S., 24 May 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 135-146 12 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Pattern Matching over Encrypted Data with a Short Ciphertext

    Kim, J., Susilo, W., Chow, Y. W., Baek, J. & Kim, I., 2021, Information Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers. Kim, H. (ed.). Springer Science and Business Media Deutschland GmbH, p. 132-143 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13009 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

    Ahmad, A., Saad, M., Kim, J., Nyang, D. H. & Mohaisen, D., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 654-656 3 p. 9333867. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments

    Viet Xuan Phuong, T., Susilo, W., Yang, G., Kim, J., Chow, Y. W. & Liu, D., 2021, Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Proceedings. Bertino, E., Shulman, H. & Waidner, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 106-126 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. & Mohaisen, D., Jun 2021, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021. Institute of Electrical and Electronics Engineers Inc., p. 3-4 2 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2020

    An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Lee, A., Nyang, D. H. & Mohaisen, D., 2020, Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Proceedings. Chellappan, S., Choo, K-K. R. & Phan, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment

    Heo, G., Yang, D., Doh, I. & Chae, K., Jan 2020, 34th International Conference on Information Networking, ICOIN 2020. IEEE Computer Society, p. 152-157 6 p. 9016501. (International Conference on Information Networking; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

    Abusnaina, A., Jang, R., Khormali, A., Nyang, D. H. & Mohaisen, D., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2459-2468 10 p. 9155465. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • Efficient Anonymous Multi-group Broadcast Encryption

    Kim, I., Hwang, S. O., Susilo, W., Baek, J. & Kim, J., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 251-270 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof

    Kim, J., Baek, J., Susilo, W. & Chow, Y. W., 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 206-216 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • From Blue-Sky to Practical Adversarial Learning

    Khormali, A., Abusnaina, A., Chen, S., Nyang, D. H. & Mohaisen, D., Oct 2020, Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020. Institute of Electrical and Electronics Engineers Inc., p. 118-127 10 p. 9325358. (Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Insights into attacks’ progression: Prediction of spatio-temporal behavior of DDoS attacks

    Abusnaina, A., Abuhamad, M., Nyang, D. H., Chen, S., Wang, A. & Mohaisen, D., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 362-374 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception

    Baek, J., Kim, J. & Susilo, W., 5 Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. Association for Computing Machinery, Inc, p. 116-126 11 p. (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • QR Code Watermarking for Digital Images

    Chow, Y. W., Susilo, W., Baek, J. & Kim, J., 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 25-37 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security

    Yang, D., Jeon, S., Doh, I. & Chae, K., Feb 2020, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 159-165 7 p. 9061277. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event

    Jang, R., Min, D. H., Moon, S. K., Mohaisen, D. & Nyang, D. H., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1339-1348 10 p. 9155252. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Soteria: Detecting adversarial examples in control flow graph-based malware classifiers

    Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. H. & Mohaisen, D., Nov 2020, Proceedings - 2020 IEEE 40th International Conference on Distributed Computing Systems, ICDCS 2020. Institute of Electrical and Electronics Engineers Inc., p. 888-898 11 p. 09355825. (Proceedings - International Conference on Distributed Computing Systems; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • 2019

    A new encoding framework for predicate encryption with non-linear structures in prime order groups

    Kim, J., Susilo, W., Guo, F., Baek, J. & Li, N., 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Deng, R. H., Ochoa, M. & Yung, M. (eds.). Springer Verlag, p. 406-425 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System

    Mowla, N. I., Doh, I. & Chae, K., 17 May 2019, 33rd International Conference on Information Networking, ICOIN 2019. IEEE Computer Society, p. 43-48 6 p. 8718118. (International Conference on Information Networking; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach

    Kim, J., Susilo, W., Baek, J., Nepal, S. & Liu, D., 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer Verlag, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Distributed network resource sharing AP in InTER-WLAN environments

    Son, J., Jo, H., Nyang, D. & Noh, Y., 12 Jun 2019, MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 584-585 2 p. (MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Dynamic group key management for efficient fog computing

    Lim, J., Doh, I. & Chae, K., 2019, Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS-2018. Javaid, N., Enokido, T., Xhafa, F. & Barolli, L. (eds.). Springer Verlag, p. 685-694 10 p. (Advances in Intelligent Systems and Computing; vol. 773).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

    Abusnaina, A., Khormali, A., Nyang, D. H., Yuksel, M. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937669. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Examining the security of DDoS detection systems in software defined networks

    Abusnaina, A., Yuksel, M., Nyang, D. H. & Mohaisen, A., 9 Dec 2019, CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019. Association for Computing Machinery, Inc, p. 49-50 2 p. (CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography

    Ji, Z., Qiao, Y., Song, F. & Yun, A., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 251-281 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets

    Choi, J., Abusnaina, A., Anwar, A., Wang, A., Chen, S., Nyang, D. H. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937574. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing

    Kim, J., Camtepe, S., Susilo, W., Nepal, S. & Baek, J., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 55-66 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • InstaMeasure: Instant per-flow detection using large In-DRAM working set of active flows

    Jang, R., Moon, S., Noh, Y., Mohaisen, A. & Nyang, D. H., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 2047-2056 10 p. 8885392. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • IoT malware ecosystem in the wild: A glimpse into analysis and exposures

    Choi, J., Spaulding, J., Anwar, A., Nyang, D. H., Alasmary, H. & Mohaisen, A., 7 Nov 2019, Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019. Association for Computing Machinery, Inc, p. 413-418 6 p. (Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems

    Saad, M., Njilla, L., Kamhoua, C., Kim, J., Nyang, D. & Mohaisen, A., May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers Inc., p. 285-292 8 p. 8751476. (ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    46 Scopus citations
  • Poster: Analyzing endpoints in the internet of things malware

    Choi, J., Anwar, A., Alasmary, H., Spaulding, J., Nyang, D. & Mohaisen, A., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 288-289 2 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: A cost-effective anomaly detection system using in-DRAM working set of active flows table

    Jang, R., Moon, S., Noh, Y., Mohaisen, A. & Nyang, D., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 286-287 2 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes

    Chow, Y. W., Susilo, W., Wang, J., Buckland, R., Baek, J., Kim, J. & Li, N., 2019, Machine Learning for Cyber Security - 2nd International Conference, ML4CS 2019, Proceedings. Chen, X., Huang, X. & Zhang, J. (eds.). Springer Verlag, p. 320-335 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Puncturable Proxy Re-Encryption Supporting to Group Messaging Service

    Phuong, T. V. X., Susilo, W., Kim, J., Yang, G. & Liu, D., 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 215-233 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS

    Mowla, N. I., Doh, I. & Chae, K., 29 Apr 2019, 21st International Conference on Advanced Communication Technology: ICT for 4th Industrial Revolution!, ICACT 2019 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 1153-1158 6 p. 8701916. (International Conference on Advanced Communication Technology, ICACT; vol. 2019-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Subgraph-based adversarial examples against graph-based IoT malware detection systems

    Abusnaina, A., Alasmary, H., Abuhamad, M., Salem, S., Nyang, D. H. & Mohaisen, A., 2019, Computational Data and Social Networks - 8th International Conference, CSoNet 2019, Proceedings. Tagarelli, A. & Tong, H. (eds.). Springer, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2018

    Authorization based on mobile whitelist in devices for device-to-device communications

    You, S., Yang, D., Doh, I. & Chae, K., 19 Apr 2018, 32nd International Conference on Information Networking, ICOIN 2018. IEEE Computer Society, p. 706-711 6 p. (International Conference on Information Networking; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations