Name
Affiliation
Papers
AZIZ MOHAISEN
VeriSign Labs, Reston, VA 20190 USA
134
Collaborators
Citations 
PageRank 
186
349
53.81
Referers 
Referees 
References 
972
2748
1384
Search Limit
1001000
Title
Citations
PageRank
Year
GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy00.342022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation10.352022
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM20.362022
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet00.342022
ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs40.402021
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations00.342021
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey50.422021
SSD-Assisted Ransomware Detection and Data Recovery Techniques20.382021
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality00.342021
SyncAttack: Double-spending in Bitcoin Without Mining Power00.342021
Exploring the Attack Surface of Blockchain: A Comprehensive Survey100.522020
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications00.342020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers30.402020
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation00.342020
Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions00.342020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.10.352020
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.00.342019
Examining the Security of DDoS Detection Systems in Software Defined Networks.10.352019
BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails00.342019
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms00.342019
Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones10.372019
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers20.412019
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking00.342019
Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT10.362019
Analyzing Endpoints in the Internet of Things Malware.00.342019
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.00.342019
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.00.342019
Analyzing And Detecting Emerging Internet Of Things Malware: A Graph-Based Approach30.372019
Breaking graph-based IoT malware detection systems using adversarial examples: poster00.342019
Secure and transparent audit logs with .00.342019
Fighting Fake News Propagation with Blockchains10.352019
Two-Stage Iot Device Scheduling With Dynamic Programming For Energy Internet Systems00.342019
Countering Selfish Mining In Blockchains10.372019
IoT malware ecosystem in the wild - a glimpse into analysis and exposures.10.362019
Analyzing endpoints in the internet of things malware: poster00.342019
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.00.342019
Subgraph-Based Adversarial Examples Against Graph-Based Iot Malware Detection Systems20.352019
Cyber Deception In The Internet Of Battlefield Things: Techniques, Instances, And Assessments00.342019
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing30.422019
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery50.512018
Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.00.342018
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.40.412018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.00.342018
Shmcaffe: A Distributed Deep Learning Platform With Shared Memory Buffer For Hpc Architecture00.342018
Defending Internet of Things Against Malicious Domain Names using D-FENS00.342018
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.10.352018
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.00.342018
XMSS: eXtended Merkle Signature Scheme.00.342018
Poster: Android Malware Detection using Multi-Flows and API Patterns.20.362017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones110.552017
  • 1
  • 2