Analyzing and detecting emerging Internet of Things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 152 | 2019 |
Adversarial learning attacks on graph-based IoT malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen 2019 IEEE 39th international conference on distributed computing systems …, 2019 | 100 | 2019 |
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021 | 77 | 2021 |
RouteChain: Towards blockchain-based secure and efficient BGP routing M Saad, A Anwar, A Ahmad, H Alasmary, M Yuksel, D Mohaisen Computer Networks 217, 109362, 2022 | 65 | 2022 |
Domain name system security and privacy: A contemporary survey A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen Computer Networks 185, 107699, 2021 | 57 | 2021 |
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ... 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 53 | 2020 |
Graph-based comparison of IoT and android malware H Alasmary, A Anwar, J Park, J Choi, D Nyang, A Mohaisen Computational Data and Social Networks: 7th International Conference, CSoNet …, 2018 | 52 | 2018 |
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021 | 47 | 2021 |
Revisiting nakamoto consensus in asynchronous networks: A comprehensive analysis of bitcoin safety and chainquality M Saad, A Anwar, S Ravi, D Mohaisen Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 37 | 2021 |
Understanding Internet of Things malware by analyzing endpoints in their static artifacts J Choi, A Anwar, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ... Computer Networks 206, 108768, 2022 | 31* | 2022 |
Statically dissecting internet of things malware: Analysis, characterization, and detection A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen Information and Communications Security: 22nd International Conference …, 2020 | 19 | 2020 |
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | 15 | 2020 |
SHELLCORE: Automating malicious IoT software detection using shell commands representation H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ... IEEE Internet of Things Journal 9 (4), 2485-2496, 2021 | 11 | 2021 |
Examining adversarial learning against graph-based iot malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ... arXiv preprint arXiv:1902.04416, 2019 | 11 | 2019 |
Understanding the hidden cost of software vulnerabilities: Measurements and predictions A Anwar, A Khormali, DH Nyang, A Mohaisen Security and Privacy in Communication Networks: 14th International …, 2018 | 10* | 2018 |
Honor among thieves: Towards understanding the dynamics and interdependencies in iot botnets J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 9 | 2019 |
Analyzing, comparing, and detecting emerging malware: a graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen arXiv preprint arXiv:1902.03955, 2019 | 8 | 2019 |
Systemically evaluating the robustness of ML-based IoT malware detectors A Abusnaina, A Anwar, S Alshamrani, A Alabduljabbar, R Jang, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 7 | 2021 |
Breaking graph-based IoT malware detection systems using adversarial examples: Poster A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ... Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 7 | 2019 |
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems A Abusnaina, A Anwar, S Alshamrani, A Alabduljabbar, R Jang, ... Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 5 | 2022 |