Copyrights Notes

For IEEE publications:© 2000-2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications: Copyright © 2001-2020 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.

    2020

  1. PDF SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
    Rhongho Jang, Daehong Min, Seongkwang Moon, Aziz Mohaisen, and DaeHun Nyang
    in Proceedings of the 39th IEEE International Conf. onComputer Communications (INFOCOM 2020)
    Beijing, CHINA, April 27-30, 2020.
  2. PDF Deep Fingerprinting Defender: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
    Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DeaHun Nyang, and Aziz Mohaisen
    in Proceedings of the 39th IEEE International Conf. onComputer Communications (INFOCOM 2020)
    Beijing, CHINA, April 27-30, 2020.
  3. PDF Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
    Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, Daehun Nyang, and David Mohaisen
    The 40th IEEE International Conference on Distributed Computing Systems (ICDCS 2020)
  4. PDF Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications
    Ulku Meteriz, Necip Fazil Yıldıran, Joongheon Kim, and David Mohaisen
    The 40th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
  5. PDF Multi-χ: Identifying Multiple Authors from Source Code Files
    Mohammed Abuhamad, Tamer Abuhmed, DaeHun Nyang, and David Mohaisen
    Privacy Enhancing Technologies Symposium (PETS), 2020.
  6. PDF Exploring the Attack Surface of Blockchain: A Systematic Overview.
    Muhammad Saad, Jeffrey Spaulding, L. Njilla, C. A. Kamhoua, S. Shetty, D. Nyang, Aziz Mohaisen:
    IEEE Communication Surveys and Tutorials, 2020
  7. PDF Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions. Best Paper Award
    M. Saad, J. Choi, J. Kim, D. Nyang, A Mohaisen
    IEEE Systems Journal (ISJ 2020)
  8. PDF AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
    Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, and DaeHun Nyang
    the IEEE Internet of Things Journal (IoTJ 2020)

    2019

  9. PDF Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
    Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
    The 14th Symposium on Electronic Crime Research (eCrime 2019)
    Pittsburgh, PA, USA, Nov 14, 2019
  10. PDF W-Net: A CNN-based Architecture for White Blood Cells Image Classification
    Changhun Jung, Jumabek Alikhanov, Mohammed Abuhamad, Aziz Mohaisen, Kyungja Han, DaeHun Nyang:
    AAAI Fall Symposium on AI for Social Good (AAAI FS 2019)
  11. PDF Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
    Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, Daehun Nyang and Aziz Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2019)
  12. PDF Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks Best Paper--Runner Up
    Ahmed Abusnaina, Aminollah Khormali, Daehun Nyang, Murat Yuksel and Aziz Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2019)
  13. PDF Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)
  14. PDF InstaMeasure: Instant Per-flow Detection UsingLarge In-DRAM Working Set of Active Flows.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)
  15. PDF Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, My Thai, A. Mohaisen:
    39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS 2019)
  16. PDF XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
    An Wang, Aziz Mohaisen and Songqing Chen.
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)
  17. PDF Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
    J. Park, A. Khormali, M. Mohaisen, A. Mohaisen.
    IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2019)
  18. PDF Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
    J. Jeon, J. Kim, J. Kim, K. Kim, A. Mohaisen, J. Kim.
    IEEE International Conference on Dependable Systems and Networks (fast abstract) (IEEE DSN 2019)
  19. PDF Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
    M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen:
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019)
  20. PDF RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
    M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen.
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019)
  21. PDF BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails.
    A. Ahmad, M. Saad, L. Njilla, C. Kamhoua, M. Bassiouni, and A. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2019)
  22. PDF Countering Selfish Mining in Blockchains
    M. Saad, L. Njilla, C. Kamhoua, and A. Mohaisen
    IEEE Computing, Networking and Communications (ICNC 2019)
  23. PDF Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
    R. Jang, J. Kang, A. Mohaisen, D. Nyang.
    IEEE Transactions on Mobile Computing (IEEE TMC 2019)
  24. PDF Two-Stage IoT Device Scheduling with Dynamic Programming for Energy Internet Systems
    L. Park, C. Lee, J. Kim, A. Mohaisen, and S. Cho
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)
  25. PDF Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)
  26. PDF Personalized Online Live Video Streaming Using Softmax-Based Multinomial Classification
    Kyeongseon Kim, Dohyun Kwon, Joongheon Kim, and Aziz Mohaisen
    Applied Science, 2019, 9(11), 2297
  27. PDF Secure and Transparent Audit Logs with BlockAudit
    Ashar Ahmed, Muhammad Saad, Aziz Mohaisen.
    Journal of Network and Computer Applications, 2019
  28. PDF Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen.
    IEEE Transactions on Network and Service Management (TNSM), 2019
  29. PDF Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
    Mao Ye, Kazi Abu Zubair, Aziz Mohaisen, and Amro Awad
    IEEE Transactions on Dependable Computing, 2019
  30. PDF Poster: DL-CAIS: Deep Learning-based Code Authorship Identification System.
    M. Abuhamad, T. Abuhmed, A. Mohaisen and D. Nyang:
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  31. PDF Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  32. PDF Poster: Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  33. PDF Poster: Analyzing Endpoints in the Internet of Things Malware.
    J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  34. PDF Poster: Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, M. Thai and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  35. PDF Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  36. PDF A Privacy-Preserving Longevity Study of Tor's Hidden Services
    Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, Aziz Mohaisen, Guevara Noubir:
    Manuscript (2019)
  37. PDF COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
    Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
    Manuscript (2019)
  38. 2018

  39. PDF Large-Scale and Language-Oblivious Code Authorship Identification.
    M. Abuhamed, T. Abuhamed, A. Mohaisen, D. Nyang:
    ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
  40. PDF ABC: Enabling Smartphone Authentication with Built-in Camera.
    Z. Ba, S. Piao, X. Fu, D. Koutsonikolas, A. Mohaisen, K. Ren:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2018)
  41. PDF SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
    S. Baek, Y. Jung, A. Mohaisen, S. Lee and D. Nyang.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2018)
  42. PDF ShmCaffe: A Distributed Deep Learning Platform with Shablack Memory.
    S. Ahn, J. Kim, E. Lim, W. Choi, A. Mohaisen and S. Kang.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2018)
  43. PDF Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Pblackictions.
    A. Anwar, A. Khormali, and A. Mohaisen.
    International Conference on Security and Privacy in Communication Networks (SecureComm 2018)
  44. PDF QOI: Assessing Participation in Threat Information Sharing.
    J. Park, H. Alasmary, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla, A. Mohaisen.
    IEEE International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018).
  45. PDF DIGITALSEAL: A Transaction Authentication Tool for Online and Offline Transactions
    C. Jung, J. Kang, A. Mohaisen, D. Nyang.
    IEEE International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018)
  46. PDF Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
    J. Park, D. Nyang, and A. Mohaisen.
    IEEE Annual Conference on Privacy, Security and Trust (IEEE PST 2018)
  47. PDF Graph-based Comparison of IoT and Android Malware
    H. Alasmary, A. Anwar, J. Park, J. Choi, D. Nyang, and A. Mohaisen
    International Conference on Computational Data and Social Networks (CSoNet 2018).
  48. PDF Towards Blockchain-Driven, Secure and Transparent Audit Logs Best Paper Award
    A. Ahmad, M. Saad, M. Bassiouni, and A. Mohaisen
    International Workshop on Distributed Ledger of Things (DLoT) @ MobiQuitous 2018.
  49. PDF Neural Network Syntax Analyzer for Embedded Standardized Deep Learning
    M. Shin, J. Kim, A. Mohaisen, J. Park, K. Lee.
    ACM International Workshop on Embedded and Mobile Deep Learning (EMDL18) @ ACM MobiSys 2018.
  50. PDF Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT
    J. Spaulding, J. Park, J. Kim, D. Nyang, A. Mohaisen
    Transactions on Emerging Telecommunications Technologies (ETT 2018).
  51. PDF Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen, Z. Gu, and K. Ren, Z. Li, C. Kamhoua, L. Njilla, D. Nyang
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2018)
  52. PDF A Data-Driven Study of DDoS Attacks and Their Dynamics
    A. Wang, W. Chang, S. Chen, and A. Mohaisen
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2018)
  53. PDF Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
    A. Wang, W. Chang, S. Chen, and A. Mohaisen
    IEEE/ACM Transactions on Networking (IEEE/ACM TNET 2018)
  54. PDF Android Malware Detection using Multi-Flows and API Patterns
    F. Shen, J. Del Vecchio, A. Mohaisen, S. Ko and L. Ziarek
    IEEE Transactions on Mobile Computing (IEEE TMC 2018).
  55. PDF Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones
    F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, and M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC 2018).
  56. PDF Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
    D. Nyang, H. Kim, W. Lee, S. Kang, G. Cho, M. Lee, A. Mohaisen
    Elsevier Computers & Security (COSE 2018)
  57. PDF D-FENS: DNS Filtering and Extraction Network System for Malicious Domain Names
    J. Spaulding
    PhD Dissertation, University of Central Florida, August 2018.
  58. PDF Network-based analysis and classification of malware using behavioral artifacts ordering
    A. Mohaisen, O. Alrawi, J. Park, J. Kim, D. Nyang, M. Mohaisen
    ICST Transactions on Security Safety, 2018.
  59. 2017

  60. PDF Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    W. Chang, A. Mohaisen, A. Wang and S. Chen:
    International Conference on Security and Privacy in Communication Networks (SECURECOMM 2017)
  61. PDF Rethinking Information Sharing for Actionable Threat Intelligence
    A. Mohaisen, O. Al Ibrahim, C. Kamhoua, K. A. Kwiat, L. Njilla:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2017)
  62. PDF Understanding the Effectiveness of Typosquatting Techniques
    J. Spaulding, D. Nyang, A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2017)
  63. PDF Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
    A. Mohaisen, K. Ren:
    ACM/IEEE Transactions on Networking (IEEE/ACM TNET 2018)
  64. PDF You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones Best Paper Award
    S. Chen, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, K. Ren, and A. Mohaisen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017).
  65. PDF An Adversary-Centric Behavior Modeling of DDoS Attacks.
    A. Wang, A. Mohaisen and S. Chen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  66. PDF When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access.
    C. Guan, A. Mohaisen, Z. Sun, F. Wei, L. Su, K. Ren and Y. Yang:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  67. PDF Android Malware Detection using Complex-Flows
    F. Shen, J. Del Vecchio, A. Mohaisen, S. Ko and L. Ziarek:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  68. PDF Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen, Z. Gu and K. Ren:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  69. PDF Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
    R. Jang, J. Kang, A. Mohaisen and D. Nyang:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  70. PDF You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
    J. Spaulding, S. Upadhyaya and A. Mohaisen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)
  71. PDF Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones.
    F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, and M. Li:
    IEEE International Conf. on Computer Communications (IEEE INFOCOM 2017)
  72. PDF SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
    Q. Wang, K. Ren, M. Du, Q. Li, and A. Mohaisen:
    Financial Cryptography and Data Security (FC 2017).
  73. PDF Crime Scene Reconstruction: Online Gold Farming Network Analysis
    J. Woo and A. Mohaisen and Y. Kim and H. Kim:
    IEEE Transactions on Information Forensics and Security (IEEE TIFS 2017)
  74. PDF Performance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms.
    Y. Mo, J. Kim, J. Kim, A. Mohaisen, and W. Lee:
    International Conference on Ubiquitous and Future Networks (IEEE ICUFN 2017)
  75. PDF Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence
    O. Al Ibrahim, A. Mohaisen, C. Kamhoua, K. Kwiat, L. Njilla:
    Technical Report 2017, University at Buffalo and Air Force Research Lab (88ABW-2017-0416)
  76. 2016

  77. PDF You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild.
    E. Lee, J. Woo, H. Kim, A. Mohaisen, H. Kim:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2016)
  78. PDF The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
    J. Spaulding, S. Upadhyaya and A. Mohaisen:
    IEEE International Conference on Availability, Reliability and Security (ARES 2016)
  79. PDF Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
    A. Kang, S. Jeong, S. Ko, K. Ren, A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2016)
  80. PDF Does Query Blocking Improve DNS Privacy?.
    A. Mohaisen, A. Kang, and K. Ren:
    17th Conference on Information Security Applications (WISA 2016)
  81. PDF Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
    A. Wang, A. Mohaisen, W. Chang, and S. Chen:
    17th Conference on Information Security Applications (WISA 2016)
  82. PDF Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
    O. Alrawi and A. Mohaisen:
    Empirical Research Methods in Information Security @ WWW 2016
  83. PDF Private Over-threshold Aggregation Protocols over Distributed Databases.
    M. Kim, A. Mohaisen, J. Cheon, Y. Kim:
    IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE 2016)
  84. PDF Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information.
    J. Jang, Hyunjae Kang, J. Woo, A. Mohaisen, and H. Kim:
    Elsevier Computers & Security (COSE 2016)
  85. PDF Detection and Classification of Android Malware by Similarity Matching of Behavior Profiles.
    J. Jang, Yaesung Yun, A. Mohaisen, J. Woo, H. Kim:
    SpringerPlus 2016
  86. PDF Multimodal game bot detection using user behavioral characteristics.
    A. Kang, S. Jeong, A. Mohaisen, H. Kim:
    SpringerPlus 2016
  87. 2015-2010

  88. PDF Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
    A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2015)
  89. PDF Separation of Benign and Malicious Network Events for Accurate Malware Family Classification.
    H. Mekky, A. Mohaisen, Z. Zhang:
    IEEE Conference on Communications and Network Security (IEEE CNS 2015)
  90. PDF Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
    A. Wang, A. Mohaisen, W. Chang, S. Chen:
    IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2015)
  91. PDF Revealing DDoS Attack Dynamics behind the Scenes.
    A. Wang, A. Mohaisen, W. Chang, S. Chen:
    International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)
  92. PDF Measuring Botnets in the Wild: Some New Trends.
    W. Chang, A. Mohaisen, A. Wang, S. Chen:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2015)
  93. PDF Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information.
    J. Jang, H. Kang, J. Woo, A. Mohaisen, H. Kim:
    Elsevier Digital Investigation, 2015
  94. PDF Timing Attacks on Access Privacy in ICN and Countermeasures.
    A. Mohaisen, H. Mekky, X. Zhang, H. Xie, and Y. Kim:
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2015)
  95. PDF Behavior-based Automated Malware Analysis and Classification.
    A. Mohaisen, O. Alrawi, M. Mohaisen:
    Elsevier Computers & Security (COSE 2015)
  96. PDF Transaction Authentication Using Complementary Colors.
    Y. Maeng, A. Mohaisen, D. Nyang:
    Elsevier Computers & Security (COSE 2015)
  97. PDF Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph.
    J. Jang, J. Woo, A. Mohaisen, J. Yun, and H. Kim:
    Mathematical Problems in Engineering, 2015
  98. PDF Interference Impacts on 60 GHz Video Streaming in Smart TV Platforms.
    J. Kim and A. Mohaisen:
    Multimedia Tools and Applications, 2015
  99. PDF Having your cake and eating it too: Domain Name Data Networking (DNDN).
    E. Ostweil, C. Murray, A. Mohaisen:
    Technical Report, Verisign Labs, 2015
  100. PDF Measuring the Leakage of Onion at the Root.
    M. Thomas and A. Mohaisen:
    ACM Workshop on Privacy in the Electronic Society (ACM WPES 2014)
  101. PDF Chatter: Exploring Classification of Malware based on the Order of Events.
    A. Mohaisen, O. Alrawi, A. West, and A. Mankin:
    IEEE Conference on Communications and Network Security (IEEE CNS 2014)
  102. PDF A Private Walk in the Clouds.
    Y. Song, H. Kim, and A. Mohaisen:
    International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2014)
  103. PDF ADAM: Automated Detection and Attribution of Malicious Webpages.
    A. Kosba, A. Mohaisen, A. West, T. Tonn:
    International Conference on Information Security Applications (WISA 2014)
  104. PDF AndroTracker: Creator Information based Android Malware Classification System.
    H. Kang, J. Jang, A. Mohaisen, and H. Kim:
    International Conference on Information Security Applications (WISA 2014)
  105. PDF Name Server Switching: Anomaly Signatures, Usage, Clustering, and Pblackiction.
    A. Mohaisen, M. Bhuiyan, and Y. Labrou:
    International Conference on Information Security Applications (WISA 2014)
  106. PDF High-Fidelity, Behavior-based Automated Malware Analysis and Classification Best Paper Award
    A. Mohaisen and O. Alrawi:
    International Conference on Information Security Applications (WISA 2014).
  107. PDF Measuring the Leakage of Onion at the Root.
    M. Thomas and A. Mohaisen:
    Hot Topics in Privacy Enhancing Technologies (HotPETS 2014)
  108. PDF AV-Meter: An Evaluation of Antivirus Scans and Labels.
    A. Mohaisen and O. Alrawi:
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  109. PDF Metadata-driven Threat Classification of Network Endpoints Appearing in Malware.
    A. West and A. Mohaisen:
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  110. PDF Kindblack Domains: Detecting and Clustering Botnet Domains Using DNS Traffic.
    M. Thomas and A. Mohaisen:
    WWW Workshops 2014
  111. PDF Keylogging-resistant Visual Authentication Protocols
    D. Nyang, A. Mohaisen, and J. Kang:
    IEEE Transactions on Mobile Computing (IEEE TMC 2014)
  112. PDF Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
    J. Kim, A. Mohaisen:
    IEEE Communication Letters, 2014.
  113. PDF SocialCloud: Trustworthy Distributed Computing on Social Networks.
    A. Mohaisen, Huy Tran, A. Chandra, and Y. Kim:
    IEEE Transactions on Services Computing, 2014 (IEEE TSC 2014)
  114. PDF A Methodical Evaluation of Antivirus Scans and Labels.
    A. Mohaisen, O. Alrawi, M. Larson, and D. McPherson:
    International Conference on Information Security Applications (WISA 2013)
  115. PDF Improving Social Network-based Sybil Defenses by Augmenting Social Graphs.
    A. Mohaisen and S. Hollenbeck:
    International Conference on Information Security Applications (WISA 2013)
  116. PDF Unveiling Zeus: Automated Classification of Malware Samples.
    A. Mohaisen and O. Alrawi:
    WWW Workshop 2013
  117. PDF ADAM: Automated detection and attribution of malicious webpages (poster). Best Poster Award
    Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn
    IEEE CNS 2013
  118. PDF Protecting Access Privacy of Cached Contents in Information Centric Networks.
    A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)
  119. PDF Trustworthy Distributed Computing on Social Networks.
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)
  120. PDF Dynamix: Anonymity on Dynamic Social Structures.
    A. Mohaisen and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)
  121. PDF Secure encounter-based social networks: Requirements, challenges, and designs.
    A. Mohaisen, D. Foo Kune, E. Vasserman, M. Kim, and Y. Kim:
    IEEE Transactions on Dependable and Secure Computing (TDSC 2013)
  122. PDF Trading Optimality for Scalability in Large-scale Opportunistic Routing.
    Y. Li, A. Mohaisen, and Z. Zhang:
    IEEE Transactions on Vehicular Technology (IEEE TVT 2013)
  123. PDF Private Top-k Aggregation Protocols.
    M. Kim and A. Mohaisen and J. Cheon and Y. Kim:
    International Conference on Information Security and Cryptology (ICISC 2012)
  124. PDF Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling.
    A. Mohaisen, P. Luo, Y. Li, Y. Kim, Z. Zhang:
    IEEE International Conference for Military Communications (IEEE MILCOM 2012)
  125. PDF On the Mixing Time of Directed Social Graphs and Security Implications.
    A. Mohaisen, H. Tran, N. Hopper, and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2012)
  126. PDF Collaboration in Social Network-based Information Dissemination.
    A. Mohaisen, T. AbuHmed, T. Zhu, M. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2012)
  127. PDF DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks.
    T. Zhu, A. Mohaisen, Y. Ping, D. Towsley:
    IEEE International Conference on Computer Communications (IEEE INFOCOM 2012)
  128. PDF Incorporating trust into social network-based Sybil defenses.
    A. Mohaisen, N. Hopper, Y. Kim:
    IEEE International Conference on Computer Communications (INFOCOM 2011)
  129. PDF Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.
    M. Mohaisen and A. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2011)
  130. PDF Losing control of the Internet: Using the data plane to attack the control plane.
    M. Schuchard, E Vasserman, A Mohaisen, D Foo Kune, N Hopper, Y Kim:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2011)
  131. PDF An analysis of a social network-based Sybil defense in mobile networks.
    A. Mohaisen, T. AbuHmed, H. Kang, D. Nyang, Y. Kim:
    ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2011)
  132. PDF Measuring the mixing time of social graphs.
    A. Mohaisen, A. Yun, Y. Kim:
    ACM Internet Measurements Conference (ACM IMC 2010)

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and A. Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and A. Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    A. Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents