Domain Name System (DNS)

The distribution and behavior of open resolvers over the world.

Distributed Denial of Service (DDoS)

Detection, evaluation, and mitigation of DDoS attack.


  • Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen: "Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service", IEEE Transactions on Network and Service Management (TNSM), 2019
  • Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, and Laurent Njilla, "Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments", Proceedings of the 20th World Conference on Information Security Applications, WISA 2019, Jeju, South Korea, Aug. 21-24, 2019
  • Hisham Alasmary, Amin Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, and Aziz Mohaisen:“Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach", IEEE Internet of Things Journal, 2019
  • Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, and Aziz Mohaisen:“Adversarial Learning Attacks on Graph-based IoT Malware Detection System", Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, IEEE ICDCS 2019, Dallas, TX, US, Jul 7-10, 2019 PDF
  • Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen:“Where Are You Taking Me? Behavioral Anlysis of Open DNS Resolvers", Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE/IFIP DSN 2019, Portland, OR, US, Jun 24-27, 2019 PDF
  • Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, and Manar Mohaisen:“Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering", EAI Endorsed Transactions on Security and Safety, 2018 PDF
  • Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, and Aziz Mohaisen:“Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT", Wiley Transactions on Emerging Telecommunications Technologies, e3505, 2018 PDF
  • Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen:“Graph-based Comparison of IoT and Android Malware", Proceedings of the 7th International Conference on Data & Social Networks, CSoNet 2018, Shanghai, China, Dec 18-20, 2018 PDF
  • Jeman Park, DaeHun Nyang, and Aziz Mohaisen:“Timing is Almost Everything: Realstic Evaluation of the Very Short Intermittent DDoS Attack", Proceedings of the 16th International Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, United Kingdom, Aug 28-30, 2018 PDF
  • Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, and Aziz Mohaisen:“QoI: Assessing Participation in Threat Information Sharing”, Proceedings of the 43rd International Conference on Acoustics, Speech and Signal Processing, IEEE ICASSP 2018, Calgary, Alberta, Canada, Apr 15-20, 2018 PDF

  • Jeffrey Spaulding, Jeman Park, Joongheon Kim, and Aziz Mohaisen:“Proactive Detection of Algorithmically Generated Malicious Domains”, Proceedings of the 32nd International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, Jan 10-12, 2018 PDF
  • Jeman Park, Jihye Kim, Seungho Kuk, Yongtae Park, and Hyogon Kim:“Exploring Smartphones as WAVE Devices”, Proceedings of the 82nd Vehicular Technology Conference, IEEE VTC 2015-Fall, Boston, MA, US, Sep 6-9, 2015 PDF
  • Song Gun Lee, Jeman Park, and Hyogon Kim:“A User-Side Energy-Saving Video Streaming Scheme for LTE Devices”, IEEE Communication Letters, Vol. 19, No. 6, pp. 965-968, 2015 PDF


  • parkjeman AT
  • Resarch1 Bldg, University of Central Florida, Orlando, Florida 32816