LinkMan: hyperlink-driven misbehavior detection in online security forums | 0 | 0.34 | 2021 |
Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity | 0 | 0.34 | 2021 |
HackerScope: The Dynamics of a Massive Hacker Online Ecosystem | 0 | 0.34 | 2020 |
Opening Digital Borders Cautiously yet Decisively - Digital Filtering in Saudi Arabia. | 0 | 0.34 | 2020 |
TenFor: a tensor-based tool to extract interesting events from security forums | 0 | 0.34 | 2020 |
RThread: a thread-centric analysis of security forums | 0 | 0.34 | 2020 |
IDAPro for IoT Malware analysis? | 0 | 0.34 | 2019 |
Extracting actionable information from Security Forums | 0 | 0.34 | 2019 |
MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors. | 0 | 0.34 | 2018 |
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking | 0 | 0.34 | 2018 |
InferIP: Extracting actionable information from security discussion forums. | 3 | 0.42 | 2017 |
One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors. | 1 | 0.35 | 2017 |
Improving Smartphone Security and Reliability. | 0 | 0.34 | 2017 |
Facebook wall posts: a model of user behaviors. | 2 | 0.36 | 2017 |
Eigen-Optimization on Large Graphs by Edge Manipulation. | 8 | 0.49 | 2016 |
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. | 0 | 0.34 | 2016 |
Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments. | 0 | 0.34 | 2016 |
“Infect-me-not”: A user-centric and site-centric study of web-based malware | 2 | 0.39 | 2016 |
Trackadvisor: Taking Back Browsing Privacy From Third-Party Trackers | 7 | 0.56 | 2015 |
TrueView: Harnessing the Power of Multiple Review Sites | 13 | 0.75 | 2015 |
Whom Does Your Android App Talk To? | 1 | 0.35 | 2015 |
Which phone will you get next: Observing trends and predicting the choice. | 0 | 0.34 | 2014 |
Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach | 4 | 0.43 | 2014 |
The socio-monetary incentives of online social network malware campaigns | 4 | 0.39 | 2014 |
Scanner hunter: understanding HTTP scanning traffic | 1 | 0.37 | 2014 |
Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams | 0 | 0.34 | 2013 |
Competing Memes Propagation on Networks: A Network Science Perspective | 24 | 1.00 | 2013 |
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies | 5 | 0.41 | 2013 |
An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks | 4 | 0.44 | 2013 |
Entelecheia: Detecting P2P botnets in their waiting stage. | 12 | 0.60 | 2013 |
ReSurf: Reconstructing web-surfing activity from network traffic | 28 | 1.12 | 2013 |
iDispatcher: A unified platform for secure planet-scale information dissemination. | 1 | 0.39 | 2013 |
Inferring cellular user demographic information using homophily on call graphs | 5 | 0.43 | 2013 |
Competing memes propagation on networks: a case study of composite networks | 14 | 0.77 | 2012 |
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? | 10 | 0.69 | 2012 |
FRAppE: detecting malicious facebook applications | 9 | 0.84 | 2012 |
SyFi: a systematic approach for estimating stateful firewall performance | 1 | 0.40 | 2012 |
Gelling, and melting, large graphs by edge manipulation | 72 | 2.07 | 2012 |
ProfileDroid: multi-layer profiling of android applications | 92 | 3.53 | 2012 |
Obtaining Provably Legitimate Internet Topologies | 2 | 0.42 | 2012 |
SUT: Quantifying and mitigating URL typosquatting | 7 | 0.82 | 2011 |
Network-level characteristics of spamming: An empirical analysis | 0 | 0.34 | 2011 |
A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks | 5 | 0.45 | 2011 |
Measurement-driven guidelines for 802.11 WLAN design | 26 | 1.06 | 2010 |
Characterizing the Scam Hosting Infrastructure | 0 | 0.34 | 2010 |
On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks | 1 | 0.36 | 2010 |
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone | 16 | 0.73 | 2010 |
PhishDef: URL names say it all | 65 | 2.46 | 2010 |
You must be joking...: is change | 0 | 0.34 | 2009 |
A Simple Conceptual Generator for the Internet Graph | 2 | 0.37 | 2009 |