Filter
Conference contribution

Search results

  • 2024

    Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation

    Althebeiti, H., Gedawy, R., Alghuried, A., Nyang, D. & Mohaisen, D., 2024, Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers. Kim, H. & Youn, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 159-174 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models

    Lee, Y., Cho, Y., Han, W., Bae, H. & Paek, Y., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 65-84 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14347 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking

    Zong, W., Chow, Y. W., Susilo, W., Baek, J., Kim, J. & Camtepe, S., 25 Mar 2024, Technical Tracks 14. Wooldridge, M., Dy, J. & Natarajan, S. (eds.). 7 ed. Association for the Advancement of Artificial Intelligence, p. 7837-7845 9 p. (Proceedings of the AAAI Conference on Artificial Intelligence; vol. 38, no. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Untargeted Code Authorship Evasion with Seq2Seq Transformation

    Choi, S., Jang, R., Nyang, D. H. & Mohaisen, D., 2024, Computational Data and Social Networks - 12th International Conference, CSoNet 2023, Proceedings. Hà, M. H., Zhu, X. & Thai, M. T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 83-92 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2023

    A Robust Counting Sketch for Data Plane Intrusion Detection

    Kim, S., Jung, C., Jang, R., Mohaisen, D. & Nyang, D. H., 2023, 30th Annual Network and Distributed System Security Symposium, NDSS 2023. The Internet Society, (30th Annual Network and Distributed System Security Symposium, NDSS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Do Content Management Systems Impact the Security of Free Content Websites?

    Alqadhi, M., Alabduljabbar, A., Thomas, K., Salem, S., Nyang, D. H. & Mohaisen, D., 2023, Computational Data and Social Networks - 11th International Conference, CSoNet 2022, Proceedings. Dinh, T. N. & Li, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 141-154 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Exploring Clustered Federated Learning’s Vulnerability against Property Inference Attack

    Kim, H., Cho, Y., Lee, Y., Bae, H. & Paek, Y., 16 Oct 2023, Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023. Association for Computing Machinery, p. 236-249 14 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System

    Kim, H. & Doh, I., 2023, 37th International Conference on Information Networking, ICOIN 2023. IEEE Computer Society, p. 312-317 6 p. (International Conference on Information Networking; vol. 2023-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Privacy-Preserving Publishing of Individual-Level Medical Data for Cloud Services

    Bae, H., Ha, H. & Kim, S., 2023, Proceedings - 2023 2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023. Jiang, X., Wang, H., Alhajj, R., Hu, X., Engel, F., Mahmud, M., Pisanti, N., Cui, X. & Song, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 456-461 6 p. (Proceedings - 2023 2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors

    Choi, S., Mohaisen, M., Nyang, D. & Mohaisen, D., 2023, Information and Communications Security - 25th International Conference, ICICS 2023, Proceedings. Wang, D., Liu, Z., Yung, M. & Chen, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 399-417 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14252 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • TLS Goes Low Cost: When TLS Meets Edge

    Kim, I., Susilo, W., Baek, J., Kim, J. & Chow, Y. W., 2023, Information Security Applications - 23rd International Conference, WISA 2022, Revised Selected Papers. You, I. & Youn, T.-Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 102-113 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13720 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

    Alkinoon, M., Alabduljabbar, A., Althebeiti, H., Jang, R., Nyang, D. H. & Mohaisen, D., 2023, ICCCN 2023 - 2023 32nd International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2022

    A Scalable and Dynamic ACL System for In-Network Defense

    Jung, C., Kim, S., Jang, R., Mohaisen, D. & Nyang, D. H., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1679-1693 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows

    Dao, D. N., Jang, R., Jung, C., Mohaisen, D. & Nyang, D. H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 331-342 12 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts

    Omar, M., Choi, S., Nyang, D. & Mohaisen, D., 30 May 2022, CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences. Association for Computing Machinery, Inc, p. 3-9 7 p. (CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R. H., Nyang, D. H. & Mohaisen, D., 26 Oct 2022, Proceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022. Association for Computing Machinery, p. 308-320 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Trojan Attacks and Defense for Speech Recognition

    Zong, W., Chow, Y. W., Susilo, W. & Kim, J., 2022, Mobile Internet Security - 5th International Symposium, MobiSec 2021, Revised Selected Papers. You, I., Kim, H., Youn, T.-Y., Palmieri, F. & Kotenko, I. (eds.). Springer Science and Business Media Deutschland GmbH, p. 195-210 16 p. (Communications in Computer and Information Science; vol. 1544 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Cloud Security Issues and Log-based Proactive Strategy

    Mejri, O., Yang, D. & Doh, I., 7 Feb 2021, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 392-397 6 p. 9370392. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Nyang, D. & Mohaisen, D., 19 Apr 2021, The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021. Association for Computing Machinery, Inc, p. 508-515 8 p. (The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement

    Kim, D., Doh, I. & Chae, K., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 828-832 5 p. 9333932. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • P2DPI: Practical and Privacy-Preserving Deep Packet Inspection

    Kim, J., Camtepe, S., Baek, J., Susilo, W., Pieprzyk, J. & Nepal, S., 24 May 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 135-146 12 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Pattern Matching over Encrypted Data with a Short Ciphertext

    Kim, J., Susilo, W., Chow, Y. W., Baek, J. & Kim, I., 2021, Information Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers. Kim, H. (ed.). Springer Science and Business Media Deutschland GmbH, p. 132-143 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13009 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

    Ahmad, A., Saad, M., Kim, J., Nyang, D. H. & Mohaisen, D., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 654-656 3 p. 9333867. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments

    Viet Xuan Phuong, T., Susilo, W., Yang, G., Kim, J., Chow, Y. W. & Liu, D., 2021, Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Proceedings. Bertino, E., Shulman, H. & Waidner, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 106-126 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. & Mohaisen, D., Jun 2021, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021. Institute of Electrical and Electronics Engineers Inc., p. 3-4 2 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2020

    An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Lee, A., Nyang, D. H. & Mohaisen, D., 2020, Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Proceedings. Chellappan, S., Choo, K.-K. R. & Phan, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment

    Heo, G., Yang, D., Doh, I. & Chae, K., Jan 2020, 34th International Conference on Information Networking, ICOIN 2020. IEEE Computer Society, p. 152-157 6 p. 9016501. (International Conference on Information Networking; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

    Abusnaina, A., Jang, R., Khormali, A., Nyang, D. H. & Mohaisen, D., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2459-2468 10 p. 9155465. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    40 Scopus citations
  • Efficient Anonymous Multi-group Broadcast Encryption

    Kim, I., Hwang, S. O., Susilo, W., Baek, J. & Kim, J., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 251-270 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof

    Kim, J., Baek, J., Susilo, W. & Chow, Y. W., 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 206-216 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • From Blue-Sky to Practical Adversarial Learning

    Khormali, A., Abusnaina, A., Chen, S., Nyang, D. H. & Mohaisen, D., Oct 2020, Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020. Institute of Electrical and Electronics Engineers Inc., p. 118-127 10 p. 9325358. (Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Insights into attacks’ progression: Prediction of spatio-temporal behavior of DDoS attacks

    Abusnaina, A., Abuhamad, M., Nyang, D. H., Chen, S., Wang, A. & Mohaisen, D., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 362-374 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception

    Baek, J., Kim, J. & Susilo, W., 5 Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. Association for Computing Machinery, Inc, p. 116-126 11 p. (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • QR Code Watermarking for Digital Images

    Chow, Y. W., Susilo, W., Baek, J. & Kim, J., 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 25-37 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security

    Yang, D., Jeon, S., Doh, I. & Chae, K., Feb 2020, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 159-165 7 p. 9061277. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event

    Jang, R., Min, D. H., Moon, S. K., Mohaisen, D. & Nyang, D. H., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1339-1348 10 p. 9155252. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Soteria: Detecting adversarial examples in control flow graph-based malware classifiers

    Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. H. & Mohaisen, D., Nov 2020, Proceedings - 2020 IEEE 40th International Conference on Distributed Computing Systems, ICDCS 2020. Institute of Electrical and Electronics Engineers Inc., p. 888-898 11 p. 09355825. (Proceedings - International Conference on Distributed Computing Systems; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • 2019

    A new encoding framework for predicate encryption with non-linear structures in prime order groups

    Kim, J., Susilo, W., Guo, F., Baek, J. & Li, N., 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Deng, R. H., Ochoa, M. & Yung, M. (eds.). Springer Verlag, p. 406-425 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System

    Mowla, N. I., Doh, I. & Chae, K., 17 May 2019, 33rd International Conference on Information Networking, ICOIN 2019. IEEE Computer Society, p. 43-48 6 p. 8718118. (International Conference on Information Networking; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach

    Kim, J., Susilo, W., Baek, J., Nepal, S. & Liu, D., 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer Verlag, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Distributed network resource sharing AP in InTER-WLAN environments

    Son, J., Jo, H., Nyang, D. & Noh, Y., 12 Jun 2019, MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 584-585 2 p. (MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Dynamic group key management for efficient fog computing

    Lim, J., Doh, I. & Chae, K., 2019, Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS-2018. Javaid, N., Enokido, T., Xhafa, F. & Barolli, L. (eds.). Springer Verlag, p. 685-694 10 p. (Advances in Intelligent Systems and Computing; vol. 773).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

    Abusnaina, A., Khormali, A., Nyang, D. H., Yuksel, M. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937669. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Examining the security of DDoS detection systems in software defined networks

    Abusnaina, A., Yuksel, M., Nyang, D. H. & Mohaisen, A., 9 Dec 2019, CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019. Association for Computing Machinery, Inc, p. 49-50 2 p. (CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography

    Ji, Z., Qiao, Y., Song, F. & Yun, A., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 251-281 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets

    Choi, J., Abusnaina, A., Anwar, A., Wang, A., Chen, S., Nyang, D. H. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937574. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Identity-based broadcast encryption with outsourced partial decryption for hybrid security models in edge computing

    Kim, J., Camtepe, S., Susilo, W., Nepal, S. & Baek, J., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 55-66 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • InstaMeasure: Instant per-flow detection using large In-DRAM working set of active flows

    Jang, R., Moon, S., Noh, Y., Mohaisen, A. & Nyang, D. H., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 2047-2056 10 p. 8885392. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • IoT malware ecosystem in the wild: A glimpse into analysis and exposures

    Choi, J., Spaulding, J., Anwar, A., Nyang, D. H., Alasmary, H. & Mohaisen, A., 7 Nov 2019, Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019. Association for Computing Machinery, Inc, p. 413-418 6 p. (Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations