Android malware detection via graphlet sampling T Gao, W Peng, D Sisodia, TK Saha, F Li, M Al Hasan IEEE Transactions on Mobile Computing 18 (12), 2754-2767, 2018 | 40 | 2018 |
On the State of Internet of Things Security: Vulnerabilities, Attacks, and Recent Countermeasures D SISODIA University of Oregon, Eugene, 2020 | 16 | 2020 |
Source-end DDoS defense in IoT environments S Mergendahl, D Sisodia, J Li, H Cam Proceedings of the 2017 workshop on internet of things security and privacy …, 2017 | 15 | 2017 |
Poster: Content-agnostic identification of cryptojacking in network traffic Y Feng, D Sisodia, J Li Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 11 | 2020 |
Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic Y Feng, J Li, D Sisodia Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 9 | 2022 |
In-network filtering of distributed denial-of-service traffic with near-optimal rule selection D Sisodia, J Li, L Jiao Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 7 | 2020 |
On multi-point, in-network filtering of distributed denial-of-service traffic M Zhang, L Shi, D Sisodia, J Li, P Reiher 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 7 | 2019 |
The catch-22 attack L Shi, D Sisodia, M Zhang, J Li, A Dainotti, P Reiher Annual Computer Security Applications Conference (ACSAC), 2019 | 7 | 2019 |
ACTS: extracting android app topological signature through graphlet sampling W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan 2016 IEEE Conference on Communications and Network Security (CNS), 37-45, 2016 | 7 | 2016 |
FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of Things S Mergendahl, D Sisodia, J Li, H Cam 2018 27th International Conference on Computer Communication and Networks …, 2018 | 6 | 2018 |
Securing the smart home via a two-mode security framework D Sisodia, S Mergendahl, J Li, H Cam Security and Privacy in Communication Networks: 14th International …, 2018 | 5 | 2018 |
On the detection of smart, self-propagating internet worms J Li, D Sisodia, S Stafford IEEE Transactions on Dependable and Secure Computing 20 (4), 3051-3063, 2022 | 3 | 2022 |
Bridging Missing Gaps in Evaluating {DDoS} Research L Shi, S Mergendahl, D Sisodia, J Li 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | 2 | 2020 |
A two-mode, adaptive security framework for smart home security applications D Sisodia, J Li, S Mergendahl, H Cam ACM Transactions on Internet of Things 5 (2), 1-31, 2024 | 1 | 2024 |
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic Y Feng, J Li, D Sisodia, P Reiher IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
Defending Against IoT-Enabled DDoS Attacks at Critical Vantage Points on the Internet D Sisodia University of Oregon, 2022 | 1 | 2022 |
Toward Adaptive DDoS-Filtering Rule Generation J Li, D Sisodia, Y Feng, L Shi, M Zhang, C Early, P Reiher 2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023 | | 2023 |
Adaptive Distributed Filtering of DDoS Traffic on the Internet J Li, D Sisodia, Y Feng, L Shi, M Zhang, C Early, P Reiher arXiv preprint arXiv:2305.13296, 2023 | | 2023 |
Panel Discussion and Audience Dialogue: Sharing Artifacts and Data for Cybersecurity Experimentation L Shi, S Mergendahl, D Sisodia, J Li, T Benzel, D Prince, D Hutchison 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | | 2020 |
Playing in the Sandbox: A Step Towards Sound DDoS Research Through High-Fidelity Evaluation L Shi, S Mergendahl, D Sisodia, J Li | | |