Name
Affiliation
Papers
GAIL-JOON AHN
Arizona State University, Tempe, AZ, USA
220
Collaborators
Citations 
PageRank 
259
3012
203.39
Referers 
Referees 
References 
6097
3194
2381
Search Limit
1001000
Title
Citations
PageRank
Year
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing10.382021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases10.352021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing20.392020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.00.342020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems50.462020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture00.342020
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies00.342020
Towards a reliable firewall for software-defined networks.10.352019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies00.342019
iCore - continuous and proactive extrospection on multi-core IoT devices.00.342019
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications.00.342018
Risk assessment of mobile applications based on machine learned malware dataset.10.352018
Measuring E-mail header injections on the world wide web.20.372018
Challenges, Opportunities and a Framework for Web Environment Forensics.00.342018
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.10.352018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.130.582018
CacheLight: Defeating the CacheKit Attack.00.342018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.00.342018
HoneyProxy: Design and implementation of next-generation honeynet via SDN.10.342017
Toward Standardization of Authenticated Caller ID Transmission.00.342017
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.00.342017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements00.342017
HoneyMix: Toward SDN-based Intelligent Honeynet.70.562016
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.10.342016
dbling: Identifying extensions installed on encrypted web thin clients00.342016
Towards Automated Threat Intelligence Fusion10.352016
Checking Intent-based Communication in Android with Intent Space Analysis.80.442016
Preface - WISA 2014.00.342015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation90.462015
Towards a Reliable SDN Firewall.70.472014
Achieving security assurance with assertion-based application construction00.342014
RiskMon: continuous and automated risk assessment of mobile applications250.842014
Morpheus: automatically generating heuristics to detect Android emulators.290.972014
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned00.342013
Multiparty Access Control for Online Social Networks: Model and Mechanisms712.092013
Using instruction sequence abstraction for shellcode detection and attribution30.492013
Towards comprehensive and collaborative forensics on email evidence40.492013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy100.552013
Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results.10.402013
Remote Attestation with Domain-Based Integrity Model and Policy Analysis120.882012
Secure Collaborative Integrity Verification For Hybrid Cloud Environments100.552012
Access control for online social networks third party applications200.822012
Model-Based Conformance Testing for Android.70.592012
SocialImpact: Systematic Analysis of Underground Social Dynamics.81.062012
Towards HIPAA-compliant healthcare systems70.722012
Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.10.352012
Policy-driven role-based access management for ad-hoc collaboration10.352012
Comparison-based encryption for fine-grained access control in clouds60.502012
Multiparty authorization framework for data sharing in online social networks180.822011
Examining Social Dynamics for Countering Botnet Attacks30.392011
  • 1
  • 2