DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
Abusnaina, Ahmed, Abuhamad, Mohammed, Alasmary, Hisham, Anwar, Afsah, Jang, Rhongho, Salem, Saeed, Nyang, DaeHun, Mohaisen, David
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach
Alasmary, Hisham, Khormali, Aminollah, Anwar, Afsah, Park, Jeman, Choi, Jinchun, Abusnaina, Ahmed, Awad, Amro, Nyang, Daehun, Mohaisen, Aziz
Published in IEEE internet of things journal (01.10.2019)
Published in IEEE internet of things journal (01.10.2019)
Get full text
Journal Article
RouteChain: Towards Blockchain-based secure and efficient BGP routing
Saad, Muhammad, Anwar, Afsah, Ahmad, Ashar, Alasmary, Hisham, Yuksel, Murat, Mohaisen, David
Published in Computer networks (Amsterdam, Netherlands : 1999) (09.11.2022)
Published in Computer networks (Amsterdam, Netherlands : 1999) (09.11.2022)
Get full text
Journal Article
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
Alasmary, Hisham, Anwar, Afsah, Abusnaina, Ahmed, Alabduljabbar, Abdulrahman, Abuhamad, Mohammed, Wang, An, Nyang, Daehun, Awad, Amro, Mohaisen, David
Published in IEEE internet of things journal (15.02.2022)
Published in IEEE internet of things journal (15.02.2022)
Get full text
Journal Article
Measuring the Cost of Software Vulnerabilities
Anwar, Afsah, Khormali, Aminollah, Choi, Jinchun, Alasmary, Hisham, Choi, Sung, Salem, Saeed, Nyang, DaeHun, Mohaisen, David
Published in EAI endorsed transactions on security and safety (30.06.2020)
Published in EAI endorsed transactions on security and safety (30.06.2020)
Get full text
Journal Article
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Abusnaina, Ahmed, Afsah Anwar, Alshamrani, Sultan, Alabduljabbar, Abdulrahman, Jang, RhongHo, Nyang, Daehun, Mohaisen, David
Published in arXiv.org (30.08.2021)
Published in arXiv.org (30.08.2021)
Get full text
Paper
Journal Article
Domain Name System Security and Privacy: A Contemporary Survey
Khormali, Aminollah, Park, Jeman, Alasmary, Hisham, Afsah Anwar, Mohaisen, David
Published in arXiv.org (27.06.2020)
Published in arXiv.org (27.06.2020)
Get full text
Paper
Journal Article
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
Afsah Anwar, Abusnaina, Ahmed, Chen, Songqing, Li, Frank, Mohaisen, David
Published in arXiv.org (26.06.2020)
Published in arXiv.org (26.06.2020)
Get full text
Paper
Journal Article
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
Alasmary, Hisham, Afsah Anwar, Abusnaina, Ahmed, Alabduljabbar, Abdulrahman, Abuhamad, Mohammad, Wang, An, Nyang, DaeHun, Awad, Amro, Mohaisen, David
Published in arXiv.org (26.03.2021)
Published in arXiv.org (26.03.2021)
Get full text
Paper
Journal Article
Domain name system security and privacy: A contemporary survey
Khormali, Aminollah, Park, Jeman, Alasmary, Hisham, Anwar, Afsah, Saad, Muhammad, Mohaisen, David
Published in Computer networks (Amsterdam, Netherlands : 1999) (11.02.2021)
Published in Computer networks (Amsterdam, Netherlands : 1999) (11.02.2021)
Get full text
Journal Article
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
Abusnaina, Ahmed, Abuhamad, Mohammed, Alasmary, Hisham, Afsah Anwar, Jang, Rhongho, Salem, Saeed, Nyang, DaeHun, Mohaisen, David
Published in arXiv.org (15.05.2020)
Published in arXiv.org (15.05.2020)
Get full text
Paper
Journal Article
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
Afsah Anwar, Choi, Jinchun, Alabduljabbar, Abdulrahman, Alasmary, Hisham, Spaulding, Jeffrey, Wang, An, Chen, Songqing, Nyang, DaeHun, Awad, Amro, Mohaisen, David
Published in arXiv.org (26.03.2021)
Published in arXiv.org (26.03.2021)
Get full text
Paper
Journal Article
Analyzing Endpoints in the Internet of Things Malware
Choi, Jinchun, Afsah Anwar, Alasmary, Hisham, Spaulding, Jeffrey, Nyang, DaeHun, Aziz Mohaisen
Published in arXiv.org (10.02.2019)
Published in arXiv.org (10.02.2019)
Get full text
Paper
Journal Article
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Abusnaina, Ahmed, Khormali, Aminollah, Alasmary, Hisham, Park, Jeman, Anwar, Afsah, Mohaisen, Aziz
Published in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (01.07.2019)
Published in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (01.07.2019)
Get full text
Conference Proceeding
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Abusnaina, Ahmed, Khormali, Aminollah, Alasmary, Hisham, Park, Jeman, Afsah Anwar, Meteriz, Ulku, Aziz Mohaisen
Published in arXiv.org (15.02.2019)
Published in arXiv.org (15.02.2019)
Get full text
Paper
Journal Article
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
Alasmary, Hisham, Khormali, Aminollah, Afsah Anwar, Park, Jeman, Choi, Jinchun, Nyang, DaeHun, Aziz Mohaisen
Published in arXiv.org (11.02.2019)
Published in arXiv.org (11.02.2019)
Get full text
Paper
Journal Article
Corrigendum to “Domain name system security and privacy: A contemporary survey” Computer Networks Volume 185 (2020) 107699
Khormali, Aminollah, Park, Jeman, Alasmary, Hisham, Anwar, Afsah, Saad, Muhammad, Mohaisen, David
Published in Computer networks (Amsterdam, Netherlands : 1999) (07.04.2021)
Published in Computer networks (Amsterdam, Netherlands : 1999) (07.04.2021)
Get full text
Journal Article