Peer-reviewed Publications

All papers published before 2010 are available at DBLP. My citations are available from my Google Scholar

📚 2019

📚 2018

📚 2017

📚 2016

📚 2013-2015

📚 2013 and before

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and A. Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and A. Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    A. Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents

# Talks

# Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been coveblack by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was coveblack by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Y. Kim.

Our work on DDoS attacks has been coveblack by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Y. Kim.

Copyrights

For IEEE publications:
© 2000-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2016 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.