Analyzing and detecting emerging Internet of Things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 165 | 2019 |
Adversarial learning attacks on graph-based IoT malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen 2019 IEEE 39th international conference on distributed computing systems …, 2019 | 108 | 2019 |
Domain name system security and privacy: A contemporary survey A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen Computer Networks, 107699, 2021 | 63 | 2021 |
Graph-based comparison of IoT and android malware H Alasmary, A Anwar, J Park, J Choi, D Nyang, A Mohaisen Computational Data and Social Networks: 7th International Conference, CSoNet …, 2018 | 55 | 2018 |
Where are you taking me? Behavioral analysis of open DNS resolvers J Park, A Khormali, M Mohaisen, A Mohaisen 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 44 | 2019 |
Mistrust Plugins You Must: A {Large-Scale} Study Of Malicious Plugins In {WordPress} Marketplaces RP Kasturi, J Fuller, Y Sun, O Chabklo, A Rodriguez, J Park, ... 31st USENIX Security Symposium (USENIX Security 22), 161-178, 2022 | 24 | 2022 |
Statically dissecting internet of things malware: Analysis, characterization, and detection A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen Information and Communications Security: 22nd International Conference …, 2020 | 21 | 2020 |
A large-scale behavioral analysis of the open DNS resolvers on the internet J Park, R Jang, M Mohaisen, D Mohaisen IEEE/ACM Transactions on Networking 30 (1), 76-89, 2021 | 17 | 2021 |
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | 17 | 2020 |
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering A Mohaisen, O Alrawi, J Park, J Kim, DH Nyang, M Mohaisen EAI Endorsed Transactions on Security and Safety, 2018 | 16 | 2018 |
Exploring smartphones As WAVE devices J Park, J Kim, S Kuk, Y Park, H Kim 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 1-5, 2015 | 15 | 2015 |
Proactive detection of algorithmically generated malicious domains J Spaulding, J Park, J Kim, A Mohaisen 2018 International Conference on Information Networking (ICOIN), 21-24, 2018 | 14 | 2018 |
Timing is almost everything: Realistic evaluation of the very short intermittent ddos attacks J Park, DH Nyang, A Mohaisen 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018 | 13 | 2018 |
Examining adversarial learning against graph-based iot malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ... arXiv preprint arXiv:1902.04416, 2019 | 11 | 2019 |
Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT J Spaulding, J Park, J Kim, DH Nyang, A Mohaisen Transactions on Emerging Telecommunications Technologies, e3505, 2018 | 10 | 2018 |
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions J Park, M Mohaisen, DH Nyang, A Mohaisen Computer Networks 173, 107146, 2020 | 8 | 2020 |
A Privacy-preserving longevity study of Tor's hidden services A Sanatinia, J Park, EO Blass, A Mohaisen, G Noubir arXiv preprint arXiv:1909.03576, 2019 | 8 | 2019 |
Analyzing, comparing, and detecting emerging malware: a graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen arXiv preprint arXiv:1902.03955, 2019 | 8 | 2019 |
A user-side energy-saving video streaming scheme for LTE devices SG Lee, J Park, H Kim IEEE Communications Letters 19 (6), 965-968, 2015 | 8 | 2015 |
Cyber deception in the internet of battlefield things: Techniques, instances, and assessments J Park, A Mohaisen, CA Kamhoua, MJ Weisman, NO Leslie, L Njilla Information Security Applications: 20th International Conference, WISA 2019 …, 2020 | 7 | 2020 |