Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation

    Althebeiti, H., Gedawy, R., Alghuried, A., Nyang, D. & Mohaisen, D., 2024, Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers. Kim, H. & Youn, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 159-174 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Enhancing Network Attack Detection with Distributed and In-Network Data Collection System

    Mirnajafizadeh, S. M. M., Sethuram, A. R., Mohaisen, D., Nyang, D. H. & Jang, R., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 5161-5178 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Untargeted Code Authorship Evasion with Seq2Seq Transformation

    Choi, S., Jang, R., Nyang, D. H. & Mohaisen, D., 2024, Computational Data and Social Networks - 12th International Conference, CSoNet 2023, Proceedings. Hà, M. H., Zhu, X. & Thai, M. T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 83-92 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2023

    A Robust Counting Sketch for Data Plane Intrusion Detection

    Kim, S., Jung, C., Jang, R., Mohaisen, D. & Nyang, D. H., 2023, 30th Annual Network and Distributed System Security Symposium, NDSS 2023. The Internet Society, (30th Annual Network and Distributed System Security Symposium, NDSS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Do Content Management Systems Impact the Security of Free Content Websites?

    Alqadhi, M., Alabduljabbar, A., Thomas, K., Salem, S., Nyang, D. H. & Mohaisen, D., 2023, Computational Data and Social Networks - 11th International Conference, CSoNet 2022, Proceedings. Dinh, T. N. & Li, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 141-154 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors

    Choi, S., Mohaisen, M., Nyang, D. & Mohaisen, D., 2023, Information and Communications Security - 25th International Conference, ICICS 2023, Proceedings. Wang, D., Liu, Z., Yung, M. & Chen, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 399-417 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14252 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

    Alkinoon, M., Alabduljabbar, A., Althebeiti, H., Jang, R., Nyang, D. H. & Mohaisen, D., 2023, ICCCN 2023 - 2023 32nd International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2022

    A Scalable and Dynamic ACL System for In-Network Defense

    Jung, C., Kim, S., Jang, R., Mohaisen, D. & Nyang, D. H., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1679-1693 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows

    Dao, D. N., Jang, R., Jung, C., Mohaisen, D. & Nyang, D. H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 331-342 12 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts

    Omar, M., Choi, S., Nyang, D. & Mohaisen, D., 30 May 2022, CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences. Association for Computing Machinery, Inc, p. 3-9 7 p. (CySSS 2022 - Proceedings of the 1st Workshop on Cybersecurity and Social Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R. H., Nyang, D. H. & Mohaisen, D., 26 Oct 2022, Proceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022. Association for Computing Machinery, p. 308-320 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2021

    Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Nyang, D. & Mohaisen, D., Jun 2021, The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021. Association for Computing Machinery, Inc, p. 508-515 8 p. (The Web Conference 2021 - Companion of the World Wide Web Conference, WWW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    29 Scopus citations
  • Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

    Ahmad, A., Saad, M., Kim, J., Nyang, D. H. & Mohaisen, D., 13 Jan 2021, 35th International Conference on Information Networking, ICOIN 2021. IEEE Computer Society, p. 654-656 3 p. 9333867. (International Conference on Information Networking; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

    Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. & Mohaisen, D., Jun 2021, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021. Institute of Electrical and Electronics Engineers Inc., p. 3-4 2 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2020

    An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments

    Alshamrani, S., Abusnaina, A., Abuhamad, M., Lee, A., Nyang, D. H. & Mohaisen, D., 2020, Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Proceedings. Chellappan, S., Choo, K.-K. R. & Phan, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

    Abusnaina, A., Jang, R., Khormali, A., Nyang, D. H. & Mohaisen, D., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2459-2468 10 p. 9155465. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    48 Scopus citations
  • From Blue-Sky to Practical Adversarial Learning

    Khormali, A., Abusnaina, A., Chen, S., Nyang, D. H. & Mohaisen, D., Oct 2020, Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020. Institute of Electrical and Electronics Engineers Inc., p. 118-127 10 p. 9325358. (Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Insights into attacks’ progression: Prediction of spatio-temporal behavior of DDoS attacks

    Abusnaina, A., Abuhamad, M., Nyang, D. H., Chen, S., Wang, A. & Mohaisen, D., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 362-374 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event

    Jang, R., Min, D. H., Moon, S. K., Mohaisen, D. & Nyang, D. H., Jul 2020, INFOCOM 2020 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1339-1348 10 p. 9155252. (Proceedings - IEEE INFOCOM; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Soteria: Detecting adversarial examples in control flow graph-based malware classifiers

    Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. H. & Mohaisen, D., Nov 2020, Proceedings - 2020 IEEE 40th International Conference on Distributed Computing Systems, ICDCS 2020. Institute of Electrical and Electronics Engineers Inc., p. 888-898 11 p. 09355825. (Proceedings - International Conference on Distributed Computing Systems; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • 2019

    Distributed network resource sharing AP in InTER-WLAN environments

    Son, J., Jo, H., Nyang, D. & Noh, Y., 12 Jun 2019, MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 584-585 2 p. (MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

    Abusnaina, A., Khormali, A., Nyang, D. H., Yuksel, M. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937669. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Examining the security of DDoS detection systems in software defined networks

    Abusnaina, A., Yuksel, M., Nyang, D. H. & Mohaisen, A., 9 Dec 2019, CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019. Association for Computing Machinery, Inc, p. 49-50 2 p. (CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets

    Choi, J., Abusnaina, A., Anwar, A., Wang, A., Chen, S., Nyang, D. H. & Mohaisen, A., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8937574. (2019 IEEE Conference on Dependable and Secure Computing, DSC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • InstaMeasure: Instant per-flow detection using large In-DRAM working set of active flows

    Jang, R., Moon, S., Noh, Y., Mohaisen, A. & Nyang, D. H., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 2047-2056 10 p. 8885392. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • IoT malware ecosystem in the wild: A glimpse into analysis and exposures

    Choi, J., Spaulding, J., Anwar, A., Nyang, D. H., Alasmary, H. & Mohaisen, A., 7 Nov 2019, Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019. Association for Computing Machinery, Inc, p. 413-418 6 p. (Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems

    Saad, M., Njilla, L., Kamhoua, C., Kim, J., Nyang, D. & Mohaisen, A., May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers Inc., p. 285-292 8 p. 8751476. (ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    67 Scopus citations
  • Poster: A cost-effective anomaly detection system using in-DRAM working set of active flows table

    Jang, R., Moon, S., Noh, Y., Mohaisen, A. & Nyang, D., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 286-287 2 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: Analyzing endpoints in the internet of things malware

    Choi, J., Anwar, A., Alasmary, H., Spaulding, J., Nyang, D. & Mohaisen, A., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 288-289 2 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Subgraph-based adversarial examples against graph-based IoT malware detection systems

    Abusnaina, A., Alasmary, H., Abuhamad, M., Salem, S., Nyang, D. H. & Mohaisen, A., 2019, Computational Data and Social Networks - 8th International Conference, CSoNet 2019, Proceedings. Tagarelli, A. & Tong, H. (eds.). Springer, p. 268-281 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • 2018

    Digitalseal: A Transaction Authentication Tool for Online and Offline Transactions

    Jung, C., Kang, J., Mohaisen, A. & Nyang, D., 10 Sep 2018, 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 6956-6960 5 p. 8462341. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2018-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Graph-based comparison of IoT and android malware

    Alasmary, H., Anwar, A., Park, J., Choi, J., Nyang, D. & Mohaisen, A., 2018, Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Proceedings. Thai, M. T., Chen, X., Li, W. W. & Sen, A. (eds.). Springer Verlag, p. 259-272 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11280 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Scopus citations
  • Large-scale and language-oblivious code authorship identification

    Abuhamad, M., AbuHmed, T., Mohaisen, A. & Nyang, D. H., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 101-114 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    74 Scopus citations
  • SSD-Insider: Internal defense of solid-state drive against ransomware with perfect data recovery

    Baek, S., Jung, Y., Mohaisen, A., Lee, S. & Nyang, D., 19 Jul 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 875-884 10 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks

    Park, J., Nyang, D. & Mohaisen, A., 29 Oct 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514210. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Understanding the hidden cost of software vulnerabilities: Measurements and predictions

    Anwar, A., Khormali, A., Nyang, D. H. & Mohaisen, A., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 377-395 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2017

    Dynamic security-level maximization for stabilized parallel deep learning architectures in surveillance applications

    Kim, J., Mo, Y. J., Lee, W. & Nyang, D., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 192-193 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Poster: Highly-accurate rogue access point detection using intentional channel interference

    Jang, R., Kang, J., Mohaisen, A. & Nyang, D., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 277-278 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Poster: Two-level network monitoring and management in WLAN using software-defined networking

    Jang, R., Cho, D., Mohaisen, A., Noh, Y. & Nyang, D., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 279-280 2 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • RFlow+: An SDN-based WLAN monitoring and management framework

    Jang, R., Cho, D., Noh, Y. & Nyang, D., 2 Oct 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8056995. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

    Jang, R., Kang, J., Mohaisen, A. & Nyang, D., 13 Jul 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2515-2520 6 p. 7980221. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Understanding the effectiveness of typosquatting techniques

    Spaulding, J., Nyang, D. & Mohaisen, A., 14 Oct 2017, HotWeb 2017 - Proceedings of the 5th ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies. Association for Computing Machinery, Inc, a9. (HotWeb 2017 - Proceedings of the 5th ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Understanding the Privacy Implications of DNSSEC Look-Aside Validation

    Mohaisen, A., Gu, Z., Ren, K., Njilla, L., Kamhoua, C. & Nyang, D. H., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 208-209 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption

    Im, J. H., Choi, J. C., Nyang, D. H. & Lee, M. K., 11 Oct 2016, Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016. Wang, K.I.-K., Jin, Q., Bhuiyan, M. Z. A., Zhang, Q. & Hsu, C.-H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 878-881 4 p. 7588948. (Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • 2012

    Anonymity-based authenticated key agreement with full binding property

    Hwang, J. Y., Eom, S., Chang, K. Y., Lee, P. J. & Nyang, D. H., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 177-191 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2011

    Mistaking friends for foes: An analysis of a social network-based Sybil defense in mobile networks

    Mohaisen, A., Hmed, T. A., Kang, H. J., Kim, Y. & Nyang, D. H., 21 Feb 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. Association for Computing Machinery, 28. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Privacy-enhanced deniable authentication e-mail service

    Ki, J. H., Yeong Hwang, J., Nyang, D. H., Hoon Lee, D. & Lim, J., 2011, Digital Enterprise and Information Systems - International Conference, DEIS 2011, Proceedings. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Short group signatures with controllable linkability

    Hwang, J. Y., Lee, S., Chung, B. H., Cho, H. S. & Nyang, D. H., 2011, Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011. p. 44-52 9 p. 5749558. (Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • 2009

    A-Kad: An anonymous P2P protocol based on Kad network

    Ni, Y. Q., Nyang, D. H. & Wang, X., 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09. p. 747-752 6 p. 5336924. (2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Software-based remote code attestation in wireless sensor network

    AbuHmed, T., Nyamaa, N. & Nyang, D. H., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425280. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    41 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.