Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang, “SHIELD: Thwarting Code Authorship Attribution.” CoRR, 2023.

Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen, “Measuring and Modeling the Free Content Web.” CoRR, 2023.

Muhammad Saad, David Mohaisen, “Analyzing In-browser Cryptojacking.” CoRR, 2023.

Kyle Thomas, Muhammad Santriaji, David Mohaisen and Yan Solihin, “Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext,” in IEEE Micro Magazine, 2023.

Soyi Jung, Jae-Hyun Kim, David Mohaisen, Joongheon Kim, “Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction.” Comput. Networks, 2023.

Won Yun, Soohyun Park, Joongheon Kim, David Mohaisen, “Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications.” IEEE Trans. Intell. Transp. Syst., 2023.

Manar Mohaisen, David Mohaisen, “Improving the Social Connectivity in Engineering Educational Networks and Implications.” IEEE Trans. Educ., 2023.

Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen, “Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study”. The 32nd International Conference on Computer Communications and Networks, ICCCN, Honolulu, HI, USA, 2023.

Muhammad Saad and David Mohaisen, “Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks,” IEEE Symposium on Security and Privacy (IEEE S&P) 2023.

Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, “A Robust Counting Sketch for Data Plane Intrusion Detection” In the proceedings of 30th Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2023.

Ulku Meteriz-Yildiran, Necip Yildiran, Joongheon Kim, David Mohaisen, “Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective.” IEEE Trans. Mob. Comput., 2023.

Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen, “Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.” CoRR, 2022.

Kazi Zubair, Sumit Jha, David Mohaisen, Clayton Hughes, Amro Awad, “FAT-PIM: Low-Cost Error Detection for Processing-In-Memory.” CoRR, 2022.

Won Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David Mohaisen, Jae-Hyun Kim, “Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.” CoRR, 2022.

Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen, “RouteChain: Towards Blockchain-based secure and efficient BGP routing”. Comput. Networks, 2022.

Changhun Jung, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang, “WBC image classification and generative models based on convolutional neural network.” BMC Medical Imaging, 2022.

Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen, “Understanding Internet of Things malware by analyzing endpoints in their static artifacts”. Comput. Networks, 2022.

Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen, “ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.” IEEE Internet Things J., 2022.

Mazen Al-Wadi, Kazi Zubair, David Mohaisen, Amro Awad, “Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM.” IEEE Trans. Dependable Secur. Comput., 2022.

Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh, “Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.” IEEE Access, 2022.

Minxin Du, Shuangke Wu, Qian Wang, Dian Chen, Peipei Jiang, David Mohaisen, “GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy.” IEEE Trans. Knowl. Data Eng., 2022.

Muhammad Saad, Victor Cook, Lan Nguyen, My Thai, David Mohaisen, “Exploring Partitioning Attacks on the Bitcoin Network.” IEEE/ACM Trans. Netw., 2022.

Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen, “DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.” IEEE Trans. Dependable Secur. Comput., 2022.

Won Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David Mohaisen, Jae-Hyun Kim, “Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.” IEEE Trans. Ind. Informatics, 2022.

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, “Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.” IEEE Trans. Dependable Secur. Comput., 2022.

Ashar Ahmad, Muhammad Saad, Mohammed AlGhamdi, DaeHun Nyang, David Mohaisen, “BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.” IEEE Syst. J., 2022.

Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang, “A One-Page Text Entry Method Optimized for Rectangle Smartwatches.” IEEE Trans. Mob. Comput., 2022.

Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen, “A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.” IEEE/ACM Trans. Netw., 2022.

Ulku Meteriz-Yildiran, Necip Yildiran, Amro Awad, David Mohaisen, “A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments.” In the proceedings of IEEE Conference on Virtual Reality and 3D User Interfaces, VR, Christchurch, New Zealand, 2022.

Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen, “Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study”. In Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, CySSS@AsiaCCS, Nagasaki, 2022.

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen, “Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.” In the proceedings of 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID, Limassol, Cyprus, 2022.

Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen, “Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.” In Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, CySSS@AsiaCCS, Nagasaki, Japan, 2022.

Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang, “Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.” In the proceedings of 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Baltimore, MD, USA, 2022.

Mazen Al-Wadi, Rujia Wang, David Mohaisen, Clayton Hughes, Simon Hammond, Amro Awad, “Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures.” In the proceedings of 2022 IEEE International Parallel and Distributed Processing Symposium, IPDPS, Virtual Event / Lyon, France, 2022.

Ayodeji Adeniran, David Mohaisen, “Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds.” CSoNet, Virtual Event, 2022.

Abdulrahman Alabduljabbar, David Mohaisen, “Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation.” In the proceedings of Companion of The Web Conference Companion Volume, WWW, Virtual Event / Lyon, France, 2022.

Ayodeji Adeniran, David Mohaisen, “Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective.” In Proceedings of the 11th International Conference of Computational Data and Social Networks, CSoNet, Virtual Event, 2022.

Marwan Omar, David Mohaisen, “Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection.” In the proceedings of Companion of The Web Conference 2022, WWW, Virtual Event / Lyon, France, 2022.

Won Yun, David Mohaisen, Soyi Jung, Jong-Kook Kim, Joongheon Kim, “Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly.” In the proceedings of Proceedings of the 31st ACM International Conference on Information and Knowledge Management, CIKM, Atlanta, GA, USA, 2022.

Kazi Zubair, David Mohaisen, Amro Awad, “Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both!.” In the proceedings of IEEE International Symposium on High-Performance Computer Architecture, HPCA, Seoul, South Korea, 2022.

Hattan Althebeiti, David Mohaisen, “Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.” WISA, 2022.

Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen, “Do Content Management Systems Impact the Security of Free Content Websites?.” In the proceedings of 11th International Conference Computational Data and Social Networks, CSoNet, Virtual Event, 2022.

Yu Mi, David Mohaisen, An Wang, “AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks.” In the proceedings of 10th IEEE Conference on Communications and Network Security, CNS, Austin, TX, USA, 2022.

Necip Yildiran, {"{U}}lk{"{u}} Meteriz{-}Yildiran, David Mohaisen, “AiRType: An Air-tapping Keyboard for Augmented Reality Environments.” In the proceedings of 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VR Workshops, Christchurch, New Zealand, 2022.

Ulku Meteriz-Yidiran, Necip Yildiran, David Mohaisen, “AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics.” In the proceedings of CHI Conference on Human Factors in Computing Systems, CHI, New Orleans, LA, USA, Extended Abstracts, 2022.

Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang, “A Scalable and Dynamic ACL System for In-Network Defense.” In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS, Los Angeles, CA, USA, 2022.

Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen, “Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts.” CoRR, 2021.

Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu, “Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing.” Frontiers Big Data, 2021.

Mao Ye, Kazi Zubair, David Mohaisen, Amro Awad, “Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories.” IEEE Trans. Dependable Secur. Comput., 2021.

Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ulku Meteriz-Yildiran, David Mohaisen, “TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights.” In the proceedings of Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, WPES, Virtual Event, Korea, 2021.

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen, “Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.” In the proceedings of 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Taipei, Taiwan, Supplemental Volume, 2021 (BEST EXTENDED ABSTRACT).

Muhammad Saad, Songqing Chen, David Mohaisen, “SyncAttack: Double-spending in Bitcoin Without Mining Power.” In the proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS, Virtual Event, Republic of Korea, 2021.

Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen, “Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.” IEEE Internet Things J., 2021.

Mohammed Alkinoon, Marwan Omar, Manar Mohaisen, David Mohaisen, “Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis.” In the proceedings of Computational Data and Social Networks - 10th International Conference, CSoNet, Virtual Event, 2021.

SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang, “SSD-Assisted Ransomware Detection and Data Recovery Techniques.” IEEE Trans. Computers, 2021.

Ulku Meteriz-Yildiran, Necip Yildiran, David Mohaisen, “SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals.” In the proceedings of Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, WPES, Virtual Event, Korea, 2021.

Muhammad Saad, Songqing Chen, David Mohaisen, “Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.” In the proceedings of 41st IEEE International Conference on Distributed Computing Systems, ICDCS, Washington DC, USA, 2021.

Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen, “Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.” In the proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS, Virtual Event, Republic of Korea, 2021.

Mazen Al{-}Wadi, David Mohaisen, Amro Awad, “ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs.” In the proceedings of 2021 International Conference on Supercomputing, ICS, Virtual Event, USA, 2021.

Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, “Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems.” In the proceedings of International Conference on Information Networking, ICOIN, Jeju Island, South Korea, 2021.

Mohammed Alkinoon, Sung Choi, David Mohaisen, “Measuring Healthcare Data Breaches.” In the proceedings of Information Security Applications - 22nd International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2021.

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen, “ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.” CoRR, 2021.

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang, “Large-scale and Robust Code Authorship Identification with Deep Feature Learning.” ACM Trans. Priv. Secur., 2021.

Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen, “Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.” CoRR, 2021.

Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen, “Empirically comparing the performance of blockchain’s consensus algorithms.” IET Blockchain, 2021.

Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen, “Domain name system security and privacy: A contemporary survey.” Comput. Networks, 2021.

Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, “Count-Less: A Counting Sketch for the Data Plane of High Speed Switches.” CoRR, 2021.

Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, “Contra-(_ast): Mechanisms for countering spam attacks on blockchain’s memory pools.” J. Netw. Comput. Appl., 2021.

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, “Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.” In the proceedings of 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Taipei, Taiwan, Supplemental Volume, 2021.

Myungjae Shin, David Mohaisen, Joongheon Kim, “Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks.” In the proceedings of International Conference on Information Networking, ICOIN, Jeju Island, South Korea, 2021.

Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ulku Meteriz-Yildiran, David Mohaisen, “Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations.” In the proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS, Virtual Event, Republic of Korea, 2021.

Ahmed Abusnaina, Yuhang Wu, Sunpreet Arora, Yizhen Wang, Fei Wang, Hao Yang, David Mohaisen, “Adversarial Example Detection Using Latent Neighborhood Graph.” In the proceedings of 2021 IEEE/CVF International Conference on Computer Vision, ICCV, Montreal, QC, Canada, 2021.

Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang, “A network-independent tool-based usable authentication system for Internet of Things devices.” Comput. Secur., 2021.

Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen, “Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.” IEEE Access, 2020.

Ulku Meteriz, Necip Yildiran, Joongheon Kim, David Mohaisen, “Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.” In the proceedings of 40th IEEE International Conference on Distributed Computing Systems, ICDCS, Singapore, 2020.

Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, David Mohaisen, “Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.” IEEE Syst. J., 2020.

Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen, “Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.” In the proceedings of Information and Communications Security - 22nd International Conference, ICICS, Copenhagen, Denmark, 2020.

Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen, “Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.” In the proceedings of 40th IEEE International Conference on Distributed Computing Systems, ICDCS, Singapore, 2020.

Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang, “SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.” In the proceedings of 39th IEEE Conference on Computer Communications, INFOCOM, Toronto, ON, Canada, 2020.

Dohyun Kwon, Joongheon Kim, David Mohaisen, Wonjun Lee, “Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching.” J. Commun. Networks, 2020.

SooHyun Park, Jeman Park, David Mohaisen, Joongheon Kim, “Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.” CoRR, 2020.

Mohammed Abuhamad, Tamer AbuHmed, DaeHun Nyang, David Mohaisen, “Multi-(chi): Identifying Multiple Authors from Source Code Files.” Proc. Priv. Enhancing Technol., 2020.

Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen, “Measuring the Cost of Software Vulnerabilities.” EAI Endorsed Trans. Security Safety, 2020.

David Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles Kamhoua, Laurent Njilla, DaeHun Nyang, “Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.” IEEE Trans. Dependable Secur. Comput., 2020.

Sultan Alshamrani, Mohammed Abuhamad, Ahmed Abusnaina, David Mohaisen, “Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.” In the proceedings of Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management, CIKM, Galway, Ireland, 2020.

Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen, “Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.” In the proceedings of Information Security Applications - 21st International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2020.

Sultan Alshamrani, Ahmed Abusnaina, David Mohaisen, “Hiding in Plain Sight: A Measurement and Analysis of Kids’ Exposure to Malicious URLs on YouTube.” CoRR, 2020.

Aminollah Khormali, DaeHun Nyang, David Mohaisen, “Generating Adversarial Examples with an Optimized Quality.” CoRR, 2020.

Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen, “From Blue-Sky to Practical Adversarial Learning.” In the proceedings of Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA, Atlanta, GA, USA, 2020.

Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen, “Exploring the Attack Surface of Blockchain: A Comprehensive Survey.” IEEE Commun. Surv. Tutorials, 2020.

Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen, “DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.” In the proceedings of 39th IEEE Conference on Computer Communications, INFOCOM, Toronto, ON, Canada, 2020.

Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, “Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.” CoRR, 2020.

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, “Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.” CoRR, 2020.

Rhongho Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, “Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.” IEEE Trans. Mob. Comput., 2020.

Jeman Park, Manar Mohaisen, DaeHun Nyang, David Mohaisen, “Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.” Comput. Networks, 2020.

Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Anho Lee, DaeHun Nyang, David Mohaisen, “An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.” In the proceedings of Computational Data and Social Networks - 9th International Conference, CSoNet, Dallas, TX, USA, 2020.

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang, “AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.” IEEE Internet Things J., 2020.

An Wang, Wentao Chang, Songqing Chen, David Mohaisen, “A Data-Driven Study of DDoS Attacks and Their Dynamics.” IEEE Trans. Dependable Secur. Comput., 2020.

An Wang, David Mohaisen, Songqing Chen, “XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).” In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Jeman Park, Aminollah Khormali, Manar Mohaisen, David Mohaisen, “Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.” In the proceedings of 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Portland, OR, USA, 2019.

Laihyuk Park, Chunghyun Lee, Joongheon Kim, David Mohaisen, Sungrae Cho, “Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.” IEEE Internet Things J., 2019.

Jeman Park, Jinchun Choi, DaeHun Nyang, David Mohaisen, “Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.” IEEE Trans. Netw. Serv. Manag., 2019.

Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, David Mohaisen, “Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.” Trans. Emerg. Telecommun. Technol., 2019.

Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, David Mohaisen, “Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.” In the proceedings of Computational Data and Social Networks - 8th International Conference, CSoNet, Ho Chi Minh City, Vietnam, 2019.

Ashar Ahmad, Muhammad Saad, David Mohaisen, “Secure and transparent audit logs with emphBlockAudit.” J. Netw. Comput. Appl., 2019.

RhongHo Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, “Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.” CoRR, 2019.

Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen, “RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.” In the proceedings of IEEE International Conference on Blockchain and Cryptocurrency, ICBC, Seoul, Korea (South), 2019.

Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, David Mohaisen, Jong-Kook Kim, “Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.” In the proceedings of 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Portland, OR, USA, Supplemental Volume, 2019.

Fan Dang, Ennan Zhai, Zhenhua Li, Pengfei Zhou, David Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li, “Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.” IEEE Trans. Mob. Comput., 2019.

Muhammad Saad, Victor Cook, Lan Nguyen, My Thai, David Mohaisen, “Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.” In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Muhammad Saad, Laurent Njilla, Charles Kamhoua, Joongheon Kim, DaeHun Nyang, David Mohaisen, “Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.” In the proceedings of IEEE International Conference on Blockchain and Cryptocurrency, ICBC, Seoul, Korea (South), 2019.

Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, “IoT malware ecosystem in the wild: a glimpse into analysis and exposures.” In the proceedings of Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC, Arlington, Virginia, USA, 2019.

Jeman Park, Manar Mohaisen, David Mohaisen, “Investigating DNS Manipulation by Open DNS Resolvers.” In the proceedings of Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT, Companion Volume, Orlando, FL, USA, 2019.

Rhongho Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, “InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.” In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, David Mohaisen, “Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.” In the proceedings of 2019 IEEE Conference on Dependable and Secure Computing, DSC, Hangzhou, China, 2019.

Muhammad Saad, Ashar Ahmad, David Mohaisen, “Fighting Fake News Propagation with Blockchains.” In the proceedings of 7th IEEE Conference on Communications and Network Security, CNS, Washington, DC, USA, 2019.

Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen, “Exploring the Attack Surface of Blockchain: A Systematic Overview.” CoRR, 2019.

Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, David Mohaisen, “Examining the Security of DDoS Detection Systems in Software Defined Networks.” In the proceedings of Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT, Companion Volume, Orlando, FL, USA, 2019.

Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, David Mohaisen, “Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.” In the proceedings of 2019 IEEE Conference on Dependable and Secure Computing, DSC, Hangzhou, China, 2019.

Muhammad Saad, Aminollah Khormali, David Mohaisen, “Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.” In the proceedings of 2019 APWG Symposium on Electronic Crime Research, eCrime, Pittsburgh, PA, USA, 2019.

Hyun-Jae Kang, Jae-wook Jang, David Mohaisen, Huy Kim, “Detecting and Classifying Android Malware using Static Analysis along with Creator Information.” CoRR, 2019.

Jeman Park, David Mohaisen, Charles Kamhoua, Michael Weisman, Nandi Leslie, Laurent Njilla, “Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.” In the proceedings of Information Security Applications - 20th International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2019.

Muhammad Saad, Laurent Njilla, Charles Kamhoua, David Mohaisen, “Countering Selfish Mining in Blockchains.” In the proceedings of International Conference on Computing, Networking and Communications, ICNC, Honolulu, HI, USA, 2019.

David Mohaisen, Songqing Chen, “Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One.” CoRR, 2019.

Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen, “COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.” CoRR, 2019.

Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, David Mohaisen, “Breaking graph-based IoT malware detection systems using adversarial examples: poster.” In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Miami, Florida, USA, 2019.

Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles Kamhoua, Mostafa Bassiouni, David Mohaisen, “BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.” In the proceedings of 2019 IEEE International Conference on Communications, ICC, Shanghai, China, 2019.

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, “Android Malware Detection Using Complex-Flows.” IEEE Trans. Mob. Comput., 2019.

Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, “Analyzing endpoints in the internet of things malware: poster.” In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Miami, Florida, USA, 2019.

Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, David Mohaisen, “Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.” IEEE Internet Things J., 2019.

Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, David Mohaisen, “Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.” In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Rhongho Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, “A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.” In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Miami, Florida, USA, 2019.

Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, David Mohaisen, Guevara Noubir, “A Privacy-Preserving Longevity Study of Tor’s Hidden Services.” CoRR, 2019.

Andreas Hulsing, Denis Butin, Stefan{-}Lukas Gazdag, Joost Rijneveld, David Mohaisen, “XMSS: eXtended Merkle Signature Scheme.” RFC, 2018.

Afsah Anwar, Aminollah Khormali, DaeHun Nyang, David Mohaisen, “Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.” In the proceedings of Security and Privacy in Communication Networks - 14th International Conference, SecureComm, Singapore, 2018.

DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, David Mohaisen, “Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.” Comput. Secur., 2018.

Muhammad Saad, David Mohaisen, “Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.” In the proceedings of IEEE INFOCOM Workshops, Honolulu, HI, USA, 2018.

Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, David Mohaisen, “Towards Blockchain-Driven, Secure and Transparent Audit Logs.” In the proceedings of Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous, New York City, NY, USA, 2018 (BEST PAPER AWARD).

Jeman Park, DaeHun Nyang, David Mohaisen, “Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.” In the proceedings of 16th Annual Conference on Privacy, Security and Trust, PST, Belfast, Northern Ireland, Uk, 2018.

Shin-Young Ahn, Joongheon Kim, Eunji Lim, Wan Choi, David Mohaisen, Sungwon Kang, “ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture.” In the proceedings of 38th IEEE International Conference on Distributed Computing Systems, ICDCS, Vienna, Austria, 2018.

SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang, “SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.” In the proceedings of 38th IEEE International Conference on Distributed Computing Systems, ICDCS, Vienna, Austria, 2018.

Jeman Park, Hisham Alasmary, Omar Al{-}Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, David Mohaisen, “QOI: Assessing Participation in Threat Information Sharing.” In the proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Calgary, AB, Canada, 2018.

Jeffrey Spaulding, Jeman Park, Joongheon Kim, David Mohaisen, “Proactive detection of algorithmically generated malicious domains.” In the proceedings of 2018 International Conference on Information Networking, ICOIN, Chiang Mai, Thailand, 2018.

Afsah Anwar, Aminollah Khormali, David Mohaisen, “POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.” In the proceedings of Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS, Incheon, Republic of Korea, 2018.

Muhammad Saad, My Thai, David Mohaisen, “POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.” In the proceedings of Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS, Incheon, Republic of Korea, 2018.

Myungjae Shin, Joongheon Kim, David Mohaisen, Jaebok Park, KyungHee Lee, “Neural Network Syntax Analyzer for Embedded Standardized Deep Learning.” In the proceedings of Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, EMDL@MobiSys, Munich, Germany, 2018.

David Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen, “Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.” EAI Endorsed Trans. Security Safety, 2018.

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang, “Large-Scale and Language-Oblivious Code Authorship Identification.” In the proceedings of Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS, Toronto, ON, Canada, 2018.

Dohyun Kwon, Sang{-}Wook Kim, Joongheon Kim, David Mohaisen, “Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.” Sensors, 2018.

Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, David Mohaisen, “Graph-Based Comparison of IoT and Android Malware.” In the proceedings of Computational Data and Social Networks - 7th International Conference, CSoNet, Shanghai, China, 2018.

Changhun Jung, Jeonil Kang, David Mohaisen, DaeHun Nyang, “Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.” In the proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Calgary, AB, Canada, 2018.

An Wang, Wentao Chang, Songqing Chen, David Mohaisen, “Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis.” IEEE/ACM Trans. Netw., 2018.

Jeffrey Spaulding, David Mohaisen, “Defending Internet of Things Against Malicious Domain Names using D-FENS.” In the proceedings of 2018 IEEE/ACM Symposium on Edge Computing, SEC, Seattle, WA, USA, 2018.

Muhammad Saad, Laurent Njilla, Charles Kamhoua, David Mohaisen, “Countering Selfish Mining in Blockchains.” ICNC, 2018.

Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, David Mohaisen, Kui Ren, “ABC: Enabling Smartphone Authentication with Built-in Camera.” In the proceedings of 25th Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2018.

Jeffrey Spaulding, Shambhu Upadhyaya, David Mohaisen, “You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, David Mohaisen, “You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 2017.

Chaowen Guan, David Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang, “When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 2017.

Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, “Understanding the effectiveness of typosquatting techniques.” In the proceedings of Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, 2017.

Wentao Chang, David Mohaisen, An Wang, Songqing Chen, “Understanding Adversarial Strategies from Bot Recruitment to Scheduling.” In the proceedings of Security and Privacy in Communication Networks - 13th International Conference, SecureComm, Niagara Falls, ON, Canada, 2017.

RhongHo Jang, DongGyu Cho, David Mohaisen, Youngtae Noh, DaeHun Nyang, “Two-level network monitoring and management in WLAN using software-defined networking: poster.” In the proceedings of Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Boston, MA, USA, 2017.

Qian Wang, Kui Ren, Minxin Du, Qi Li, David Mohaisen, “SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.” In the proceedings of Financial Cryptography and Data Security - 21st International Conference, FC, Sliema, Malta, Revised Selected Papers, 2017.

RhongHo Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, “Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

David Mohaisen, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, “Rethinking information sharing for threat intelligence.” In the proceedings of Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb, San Jose / Silicon Valley, CA, USA, 2017.

David Mohaisen, Zhongshu Gu, Kui Ren, “Privacy Implications of DNSSEC Look-Aside Validation.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017. Also appeared as a poster In the proceedings of IEEE Symposium on Privacy-Aware Computing, PAC 2017.

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, “Poster: Android Malware Detection using Multi-Flows and API Patterns.” In the proceedings of Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, Niagara Falls, NY, USA, 2017.

Young Mo, Joongheon Kim, Jong{-}Kook Kim, David Mohaisen, Woojoo Lee, “Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms.” In the proceedings of Ninth International Conference on Ubiquitous and Future Networks, ICUFN, Milan, Italy, 2017.

David Mohaisen, Kui Ren, “Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.” IEEE/ACM Trans. Netw., 2017.

Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, David Mohaisen, Qingfu Wen, Mo Li, “Large-scale invisible attack on AFC systems with NFC-equipped smartphones.” In the proceedings of 2017 IEEE Conference on Computer Communications, INFOCOM, Atlanta, GA, USA, 2017.

RhongHo Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, “Highly-accurate rogue access point detection using intentional channel interference: poster.” In the proceedings of Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Boston, MA, USA, 2017.

Joongheon Kim, David Mohaisen, “Distributed and reliable decision-making for cloud-enabled mobile service platforms.” Int. J. Distributed Sens. Networks, 2017.

Hyukmin Kwon, David Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kim, “Crime Scene Reconstruction: Online Gold Farming Network Analysis.” IEEE Trans. Inf. Forensics Secur., 2017.

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, “Android Malware Detection Using Complex-Flows.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

An Wang, David Mohaisen, Songqing Chen, “An Adversary-Centric Behavior Modeling of DDoS Attacks.” In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, David Mohaisen, Huy Kim, “You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.” In the proceedings of 23rd Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2016.

Ah Kang, Seong Jeong, Steven Ko, Kui Ren, David Mohaisen, “Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.” In the proceedings of Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb, Washington, DC, USA, 2016.

Jeffrey Spaulding, Shambhu Upadhyaya, David Mohaisen, “The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.” In the proceedings of 11th International Conference on Availability, Reliability and Security, ARES, Salzburg, Austria, 2016.

Myungsun Kim, David Mohaisen, Jung Cheon, Yongdae Kim, “Private Over-Threshold Aggregation Protocols over Distributed Datasets.” IEEE Trans. Knowl. Data Eng., 2016.

Ah Kang, Seong Jeong, David Mohaisen, Huy Kim, “Multimodal Game Bot Detection using User Behavioral Characteristics.” CoRR, 2016.

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, “Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.” In the proceedings of Information Security Applications - 17th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2016.

Jae-wook Jang, Jiyoung Woo, David Mohaisen, Jaesung Yun, Huy Kim, “Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.” CoRR, 2016.

Omar Alrawi, David Mohaisen, “Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.” In the proceedings of Proceedings of the 25th International Conference on World Wide Web, WWW, Montreal, Canada, Companion Volume, 2016.

Jae-wook Jang, Jaesung Yun, David Mohaisen, Jiyoung Woo, Huy Kim, “Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.” CoRR, 2016.

Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, David Mohaisen, Huy Kim, “Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.” Comput. Secur., 2016.

Seong Jeong, Ah Kang, Joongheon Kim, Huy Kim, David Mohaisen, “A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.” In the proceedings of Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, 2016.

YoungJae Maeng, David Mohaisen, Mun-Kyu Lee, DaeHun Nyang, “Transaction authentication using complementary colors.” Comput. Secur., 2015.

David Mohaisen, “Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.” In the proceedings of Third IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2015, Washington, DC, USA, 2015.

David Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim, “Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.” IEEE Trans. Dependable Secur. Comput., 2015.

Hesham Mekky, David Mohaisen, Zhi-Li Zhang, “Separation of benign and malicious network events for accurate malware family classification.” In the proceedings of 2015 IEEE Conference on Communications and Network Security, CNS, Florence, Italy, 2015.

Wentao Chang, David Mohaisen, An Wang, Songqing Chen, “Measuring Botnets in the Wild: Some New Trends.” In the proceedings of Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS, Singapore, 2015.

Joongheon Kim, David Mohaisen, Song-Nam Hong, “Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms.” Multim. Tools Appl., 2015.

Hyun{-}Jae Kang, Jae{-}wook Jang, David Mohaisen, Huy Kim, “Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.” Int. J. Distributed Sens. Networks, 2015.

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, “Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.” In the proceedings of 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, 2015.

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, “Capturing DDoS Attack Dynamics Behind the Scenes.” In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, 2015.

Jae{-}wook Jang, Hyunjae Kang, Jiyoung Woo, David Mohaisen, Huy Kim, “Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.” Digit. Investig., 2015.

David Mohaisen, Omar Alrawi, Manar Mohaisen, “AMAL: High-fidelity, behavior-based automated malware analysis and classification.” Comput. Secur., 2015.

David Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “Trustworthy Distributed Computing on Social Networks.” IEEE Trans. Serv. Comput., 2014.

Manar Mohaisen, David Mohaisen, Merouane Debbah, “Parallel QRD-M encoder for multi-user MIMO systems.” Telecommun. Syst., 2014.

An Wang, Wentao Chang, David Mohaisen, Songqing Chen, “POSTER: How Distributed Are Today’s DDoS Attacks?” In the proceedings of Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS, Scottsdale, AZ, USA, 2014.

Hesham Mekky, David Mohaisen, Zhi{-}Li Zhang, “POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.” In the proceedings of Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS, Scottsdale, AZ, USA, 2014.

David Mohaisen, Mansurul Bhuiyan, Yannis Labrou, “Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction.” In the proceedings of Information Security Applications - 15th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2014.

Andrew West, David Mohaisen, “Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.” In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA, Egham, UK, 2014.

Matthew Thomas, David Mohaisen, “Measuring the Leakage of Onion at the Root: A measurement of Tor’s .onion pseudo-TLD in the global domain name system.” In the proceedings of Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES, Scottsdale, AZ, USA, 2014.

Matthew Thomas, David Mohaisen, “Kindred domains: detecting and clustering botnet domains using DNS traffic.” In the proceedings of 23rd International World Wide Web Conference, WWW, Seoul, Republic of Korea, Companion Volume, 2014.

DaeHun Nyang, David Mohaisen, Jeonil Kang, “Keylogging-Resistant Visual Authentication Protocols.” IEEE Trans. Mob. Comput., 2014.

Joongheon Kim, David Mohaisen, Jong{-}Kook Kim, “Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.” IEEE Commun. Lett., 2014.

David Mohaisen, Andrew West, Allison Mankin, Omar Alrawi, “Chatter: Classifying malware families using system event ordering.” In the proceedings of IEEE Conference on Communications and Network Security, CNS, San Francisco, CA, USA, 2014.

Wentao Chang, An Wang, David Mohaisen, Songqing Chen, “Characterizing botnets-as-a-service.” In the proceedings of ACM SIGCOMM 2014 Conference, SIGCOMM, Chicago, IL, USA, 2014.

David Mohaisen, Omar Alrawi, “AV-Meter: An Evaluation of Antivirus Scans and Labels.” In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA, Egham, UK, 2014.

David Mohaisen, Omar Alrawi, “AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.” In the proceedings of Information Security Applications - 15th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2014 (BEST PAPER AWARD).

Ahmed Kosba, David Mohaisen, Andrew West, Trevor Tonn, Huy Kim, “ADAM: Automated Detection and Attribution of Malicious Webpages.” In the proceedings of Information Security Applications - 15th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2014.

Youngbae Song, Hyoungshick Kim, David Mohaisen, “A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.” In the proceedings of Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus, Munich, Germany, 2014.

David Mohaisen, Omar Alrawi, “Unveiling Zeus: automated classification of malware samples.” In the proceedings of 22nd International World Wide Web Conference, WWW, Rio de Janeiro, Brazil, Companion Volume, 2013.

David Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “Trustworthy distributed computing on social networks.” In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS , Hangzhou, China, 2013.

Yanhua Li, David Mohaisen, Zhi{-}Li Zhang, “Trading Optimality for Scalability in Large-Scale Opportunistic Routing.” IEEE Trans. Veh. Technol., 2013.

David Mohaisen, Omar Alrawi, Matt Larson, Danny McPherson, “Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".” In the proceedings of Information Security Applications - 14th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2013.

David Mohaisen, Denis Kune, Eugene Vasserman, Myungsun Kim, Yongdae Kim, “Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.” IEEE Trans. Dependable Secur. Comput., 2013.

David Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim, “Protecting access privacy of cached contents in information centric networks.” In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China, 2013.

David Mohaisen, Scott Hollenbeck, “Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.” In the proceedings of Information Security Applications - 14th International Workshop, WISA, Jeju Island, Korea, Revised Selected Papers, 2013.

David Mohaisen, Yongdae Kim, “Dynamix: anonymity on dynamic social structures.” In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS, Hangzhou, China, 2013.

Mansurul Bhuiyan, David Mohaisen, Yannis Labrou, Mohammad Hasan, “Characterization of the dynamics and interactions of domain names and name server.” In the proceedings of IEEE Conference on Communications and Network Security, CNS, National Harbor, MD, USA, 2013.

David Mohaisen, Omar Alrawi, Andrew West, Allison Mankin, “Babble: Identifying malware by its dialects.” In the proceedings of IEEE Conference on Communications and Network Security, CNS, National Harbor, MD, USA, 2013.

Ahmed Kosba, David Mohaisen, Andrew West, Trevor Tonn, “ADAM: Automated detection and attribution of malicious webpages.” In the proceedings of IEEE Conference on Communications and Network Security, CNS, National Harbor, MD, USA, 2013.

David Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim, “Protecting access privacy of cached contents in information centric networks.” In the proceedings of the ACM Conference on Computer and Communications Security, CCS, Raleigh, NC, USA, 2012.

Myungsun Kim, David Mohaisen, Jung Cheon, Yongdae Kim, “Private Over-Threshold Aggregation Protocols.” In the proceedings of Information Security and Cryptology, the 15th International Conference, ICISC, Seoul, Korea, Revised Selected Papers, 2012.

David Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim, “On the mixing time of directed social graphs and security implications.” In the proceedings of 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS, Seoul, Korea, 2012.

David Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang, “Measuring bias in the mixing time of social graphs due to graph sampling.” In the proceedings of 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, 2012.

Ting Zhu, David Mohaisen, Yi Ping, Don Towsley, “DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks.” In the proceedings of Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 2012.

David Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen, “Collaboration in social network-based information dissemination.” In the proceedings of Proceedings of IEEE International Conference on Communications, ICC, Ottawa, ON, Canada, 2012.

David Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim, “Understanding Social Networks Properties for Trustworthy Computing.” In the proceedings of 31st IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops, Minneapolis, Minnesota, USA, 2011.

Manar Mohaisen, David Mohaisen, Yanhua Li, Pengkui Luo, “Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.” In the proceedings of Proceedings of IEEE International Conference on Communications, ICC, Kyoto, Japan, 2011.

David Mohaisen, Tamer AbuHmed, Hun Kang, Yongdae Kim, DaeHun Nyang, “Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.” In the proceedings of Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC, Seoul, Republic of Korea, 2011.

Max Schuchard, David Mohaisen, Denis Kune, Nicholas Hopper, Yongdae Kim, Eugene Vasserman, “Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.” In the proceedings of Proceedings of the Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2011.

David Mohaisen, Nicholas Hopper, Yongdae Kim, “Keep your friends close: Incorporating trust into social network-based Sybil defenses.” In the proceedings of the 30th IEEE International Conference on Computer Communications, INFOCOM, Shanghai, China, 2011.

David Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang, “Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.” IEICE Trans. Inf. Syst., 2010.

David Mohaisen, DaeHun Nyang, “On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.” J. Commun., 2010.

David Mohaisen, Aaram Yun, Yongdae Kim, “Measuring the mixing time of social graphs.” In the proceedings of Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC, Melbourne, Australia, 2010.

Max Schuchard, David Mohaisen, Denis Kune, Nicholas Hopper, Yongdae Kim, Eugene Vasserman, “Losing control of the internet: using the data plane to attack the control plane.” In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS, Chicago, Illinois, USA, 2010.

David Mohaisen, Nicholas Hopper, Yongdae Kim, “Designs to account for trust in social network-based sybil defenses.” In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS, Chicago, Illinois, USA, 2010.

David Mohaisen, Eugene Vasserman, Max Schuchard, Denis Kune, Yongdae Kim, “Secure encounter-based social networks: requirements, challenges, and designs.” In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS, Chicago, Illinois, USA, 2010.

Dowon Hong, David Mohaisen, “Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering.” ETRI Journal, 2010.

David Mohaisen, Dowon Hong, “Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering.” ETRI Journal, 2009.

David Mohaisen, DaeHun Nyang, KyungHee Lee, “Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.” Int. J. Netw. Secur., 2009.

David Mohaisen, Nam{-}Su Jho, Dowon Hong, “A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.” In the proceedings of Advances in Information Security and Assurance, Third International Conference and Workshops, ISA, Seoul, Korea, 2009.

David Mohaisen, Dowon Hong, DaeHun Nyang, “Privacy in Location Based Services: Primitives Toward the Solution.” The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, 2008.

David Mohaisen, Ik Jeong, Dowon Hong, Nam{-}Su Jho, DaeHun Nyang, “Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.” In the proceedings of Ubiquitous Intelligence and Computing, 5th International Conference, UIC, Oslo, Norway, 2008.

Tamer AbuHmed, David Mohaisen, DaeHun Nyang, “A Survey on Deep Packet Inspection for Intrusion Detection Systems.” Korea Telecommunication Magazine, 2008.

David Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, “Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.” In the proceedings of Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN, Beijing, China 2007.

YoungJae Maeng, David Mohaisen, DaeHun Nyang, “Secret Key Revocation in Sensor Networks.” In the proceedings of Ubiquitous Intelligence and Computing, 4th International Conference, UIC, Hong Kong, China, 2007.

David Mohaisen, YoungJae Maeng, DaeHun Nyang, “On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.” In the proceedings of Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD, International Workshops, Nanjing, China, Revised Selected Papers, 2007.

David Mohaisen, DaeHun Nyang, “Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.” In the proceedings of Wireless Sensor Networks, Third European Workshop, EWSN, Zurich, Switzerland, 2006.

DaeHun Nyang, David Mohaisen, “Cooperative Public Key Authentication Protocol in Wireless Sensor Network.” In the proceedings of Ubiquitous Intelligence and Computing, Third International Conference, UIC, Wuhan, China, 2006.