Παρακολούθηση
Ali Zand
Ali Zand
Google
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.ucsb.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
255*2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS 17, 10-14722, 2017
1362017
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1262020
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sedighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
Targeted attacks against industrial control systems: Is the power industry prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 13-22, 2014
652014
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
632011
Extracting Probable Command and Control Signatures for Detecting Botnets
A Zand, G Vigna, X Yan, C Kruegel
Symposium On Applied Computing (SAC), 2014
472014
Nexat: A history-based approach to predict attacker actions
C Cipriano, A Zand, A Houmansadr, C Kruegel, G Vigna
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
342011
Rippler: Delay injection for service dependency detection
A Zand, G Vigna, R Kemmerer, C Kruegel
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2157-2165, 2014
332014
Who is targeted by email-based phishing and malware? measuring factors that differentiate risk
C Simoiu, A Zand, K Thomas, E Bursztein
Proceedings of the ACM Internet Measurement Conference, 567-576, 2020
302020
Demystifying DDoS as a service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
172017
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
122016
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al. 2017. Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proc. CCS 10 (3133956.3134067), 0
12
Know your achilles' heel: Automatic detection of network critical services
A Zand, A Houmansadr, G Vigna, R Kemmerer, C Kruegel
Proceedings of the 31st Annual Computer Security Applications Conference, 41-50, 2015
102015
& Margolis, D.(2017, October). Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 0
6
Contextualizing Network Security
A Zand
University of California, Santa Barbara, 2015
12015
A Voting-Based Architecture for Survivable Hierarchical IDSes
A Zand, B Sadeghian
2009
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–17