Deep Android Malware Detection N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ... ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017 | 565 | 2017 |
FlowGuard: Building Robust Firewalls for Software-Defined Networks H Hu, W Han, GJ Ahn, Z Zhao ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014 | 372 | 2014 |
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin K Liao, Z Zhao, A Doupé, GJ Ahn APWG Symposium on Electronic Crime Research (eCrime), 2016 | 212 | 2016 |
Uncovering the face of android ransomware: Characterization and real-time detection J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn IEEE Transactions on Information Forensics and Security (TIFS) 13 (5), 1286-1300, 2017 | 178 | 2017 |
Morpheus: Automatically Generating Heuristics to Detect Android Emulators Y Jing, Z Zhao, GJ Ahn, H Hu Annual Computer Security Applications Conference (ACSAC), 2014 | 131 | 2014 |
Matched and mismatched socs: A qualitative study on security operations center issues FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn ACM SIGSAC Conference on Computer and Communications Security (CCS), 1955-1970, 2019 | 130 | 2019 |
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam H Tu, A Doupé, Z Zhao, GJ Ahn IEEE Symposium on Security and Privacy (Oakland), 2016 | 126 | 2016 |
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications Y Jing, GJ Ahn, Z Zhao, H Hu ACM Conference on Data and Application Security and Privacy (CODASPY), 2014 | 106 | 2014 |
Risk-Aware Mitigation for MANET Routing Attacks Z Zhao, H Hu, G Ahn, R Wu IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012 | 87 | 2012 |
HoneyMix: Toward SDN-based Intelligent Honeynet W Han, Z Zhao, A Doupé, GJ Ahn ACM International Workshop on Security in Software Defined Networks and …, 2016 | 83 | 2016 |
Toward a Moving Target Defense for Web Applications M Taguinod, A Doupé, Z Zhao, A Gail-Joon 16th IEEE International Conference on Information Reuse and Integration (IRI), 2015 | 83 | 2015 |
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks H Hu, GJ Ahn, Z Zhao, D Yang ACM Symposium on Access Control Models and Technologies (SACMAT), 2014 | 80 | 2014 |
On the Security of Picture Gesture Authentication Z Zhao, GJ Ahn, JJ Seo, H Hu USENIX Security Symposium, 2013 | 80 | 2013 |
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ... International Conference on Autonomous Agents and Multiagent Systems, 2017 | 73 | 2017 |
Dandroid: A multi-view discriminative adversarial network for obfuscated android malware detection S Millar, N McLaughlin, J Martinez del Rincon, P Miller, Z Zhao ACM conference on data and application security and privacy (CODASPY), 353-364, 2020 | 65 | 2020 |
HoneyProxy: Design and implementation of next-generation honeynet via SDN S Kyung, W Han, N Tiwari, VH Dixit, L Srinivas, Z Zhao, A Doupé, GJ Ahn 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 56 | 2017 |
Users Really Do Answer Telephone Scams H Tu, A Doupé, Z Zhao, GJ Ahn USENIX Security Symposium, 1327-1340, 2019 | 55 | 2019 |
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Annual Computer Security Applications Conference (ACSAC), 2018 | 55 | 2018 |
Moving target defense for web applications using bayesian stackelberg games SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ... 2016 International Conference on Autonomous Agents & Multiagent systems …, 2016 | 55 | 2016 |
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation Z Zhao, GJ Ahn, H Hu ACM Transactions on Information and System Security (TISSEC), 2015 | 55 | 2015 |