Publications
Preprints
Blockchain Security and Privacy Examined: Threats, Challenges, Applications, and Tools
A. Alghuried, M. Alkinoon, M. Mohaisen, A. Wang, C. Zou, and D. Mohaisen
DRAFT, 2024.Semantics-Preserving Node Injection Attacks Against GNN-based ACFG Malware Classifiers
D. Zapzalka, S. Salem, and D. Mohaisen
DRAFT, 2024.
under review, major revision @ IEEE TDSCAnalyzing In-browser Cryptojacking
M. Saad, D. Mohaisen
CoRR, 2023.
Local, 2024.SHIELD: Thwarting Code Authorship Attribution
M. Abuhamad, C. Jung, D. Mohaisen, D. Nyang
CoRR, 2023.Measuring and Modeling the Free Content Web
A. Alabduljabbar, R. Ma, A. Abusnaina, R. Jang, S. Chen, D. Nyang, M. Mohaisen
CoRR, 2023.
Journal and Conference Papers
Analyzing In-browser Cryptojacking
M. Saad, D. Mohaisen
[IEEE TDSC], 2024 (to appear).Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext
K. Thomas, M. Santriaji, D. Mohaisen and Y. Solihin
IEEE Micro Magazine, 2023.Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications
W. Yun, S. Park, J. Kim, D. Mohaisen
IEEE Trans. Intell. Transp. Syst., 2023.Improving the Social Connectivity in Engineering Educational Networks and Implications
M. Mohaisen, D. Mohaisen
IEEE Trans. Educ., 2023.Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
U. Meteriz-Yildiran, N. Yildiran, J. Kim, D. Mohaisen
IEEE Trans. Mob. Comput., 2023.Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction
S. Jung, J.-H. Kim, D. Mohaisen, J. Kim
Comput. Networks, 2023.Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks
M. Saad and D. Mohaisen
IEEE S&P, 2023.A Robust Counting Sketch for Data Plane Intrusion Detection
S. Kim, C. Jung, R. Jang, D. Mohaisen, D. Nyang
ISOC NDSS, San Diego, California, USA, 2023.Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study
M. Alkinoon, A. Alabduljabbar, H. Althebeiti, R. Jang, D. Nyang, D. Mohaisen
IEEE ICCCN, Honolulu, HI, USA, 2023.Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences
D. Mohaisen
ACM SNTA (Keynote), Orlando, 2023Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
M. O., S. Choi, D. Nyang, D. Mohaisen
CoRR, 2022.FAT-PIM: Low-Cost Error Detection for Processing-In-Memory
K. Zubair, S. Jha, D. Mohaisen, C. Hughes, A. Awad
CoRR, 2022.Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control
W. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, J.-H. Kim
CoRR, 2022.RouteChain: Towards Blockchain-based secure and efficient BGP routing
M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yuksel, D. Mohaisen
Comput. Networks, 2022.WBC image classification and generative models based on convolutional neural network
C. Jung, M. Abuhamad, D. Mohaisen, K. Han, D. Nyang
BMC Medical Imaging, 2022.Understanding Internet of Things malware by analyzing endpoints in their static artifacts
J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, D. Mohaisen
Comput. Networks, 2022.ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
H. Alasmary, A. Anwar, A. Abusnaina, A. Alabduljabbar, M. Abuhamad, A. Wang, D. Nyang, A. Awad, D. Mohaisen
IEEE Internet Things J., 2022.Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
M. Al-Wadi, K. Zubair, D. Mohaisen, A. Awad
IEEE Trans. Dependable Secur. Comput., 2022.Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches
K. Alikhanov, R. Jang, M. Abuhamad, D. Mohaisen, D. Nyang, Y. Noh
IEEE Access, 2022.GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy
M. Du, S. Wu, Q. Wang, D. Chen, P. Jiang, D. Mohaisen
IEEE Trans. Knowl. Data Eng., 2022.Exploring Partitioning Attacks on the Bitcoin Network
M. Saad, V. Cook, L. Nguyen, M. Thai, D. Mohaisen
IEEE/ACM Trans. Netw., 2022.DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
A. Abusnaina, M. Abuhamad, H. Alasmary, A. Anwar, R. Jang, S. Salem, D. Nyang, D. Mohaisen
IEEE Trans. Dependable Secur. Comput., 2022.Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control
W. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, J.-H. Kim
IEEE Trans. Ind. Informatics, 2022.Cleaning the NVD: Comprehensive Quality Assessment, Improvements*, and Analyses
A. Anwar, A. Abusnaina, S. Chen, F. Li, D. Mohaisen
IEEE Trans. Dependable Secur. Comput., 2022
DSN (extended abstract), Taipei, Taiwan, Supplemental Volume, 2021BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails
A. Ahmad, M. Saad, M. AlGhamdi, D. Nyang, D. Mohaisen
IEEE Syst. J., 2022.A One-Page Text Entry Method Optimized for Rectangle Smartwatches
R. Jang, C. Jung, D. Mohaisen, K. Lee, D. Nyang
IEEE Trans. Mob. Comput., 2022.A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
J. Park, R. Jang, M. Mohaisen, D. Mohaisen
IEEE/ACM Trans. Netw., 2022.A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
U. Meteriz-Yildiran, N. Yildiran, A. Awad, D. Mohaisen
IEEE VR, Christchurch, New Zealand, 2022.
🏅 Best Paper CandidateUnderstanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
A. Alabduljabbar, R. Ma, S. Choi, R. Jang, S. Chen, D. Mohaisen
ACM CySSS@AsiaCCS, Nagasaki, 2022.Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
RAID, Limassol, Cyprus, 2022.Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts
M. O., S. Choi, D. Nyang, D. Mohaisen
ACM CySSS@AsiaCCS, Nagasaki, Japan, 2022.Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
D. Dao, R. Jang, C. Jung, D. Mohaisen, D. Nyang
IEEE DSN, Baltimore, MD, USA, 2022.Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures
M. Al-Wadi, R. Wang, D. Mohaisen, C. Hughes, S. Hammond, A. Awad
IEEE IPDPS, Virtual Event / Lyon, France, 2022.Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds
A. Adeniran, D. Mohaisen
CSoNet, Virtual Event, 2022.Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation
A. Alabduljabbar, D. Mohaisen
SocialNLP@WWW, Virtual Event / Lyon, France, 2022.Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection
M. O., D. Mohaisen
SocialNLP@WWW, Virtual Event / Lyon, France, 2022.Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly
W. Yun, D. Mohaisen, S. Jung, J.-K. Kim, J. Kim
ACM CIKM, Atlanta, GA, USA, 2022.Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both!
K. Zubair, D. Mohaisen, A. Awad,
IEEE HPCA, Seoul, South Korea, 2022.Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
H. Althebeiti, D. Mohaisen
WISA, 2022.Do Content Management Systems Impact the Security of Free Content Websites?
M. Alqadhi, A. Alabduljabbar, K. Thomas, S. Salem, D. Nyang, D. Mohaisen
CSoNet, Virtual Event, 2022.AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks
Y. Mi, D. Mohaisen, A. Wang
IEEE CNS, Austin, TX, USA, 2022.AiRType: An Air-tapping Keyboard for Augmented Reality Environments
N. Yildiran, U. Meteriz-Yildiran, D. Mohaisen
IEEE VR, Christchurch, New Zealand, 2022.AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics
U. Meteriz-Yidiran, N. Yildiran, D. Mohaisen
ACM CHI, New Orleans, LA, USA, Extended Abstracts, 2022.A Scalable and Dynamic ACL System for In-Network Defense
C. Jung, S. Kim, R. Jang, D. Mohaisen, D. Nyang
ACM CCS, Los Angeles, CA, USA, 2022.Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing
D. Wang, K. Liu, D. Mohaisen, P. Wang, C.-T. Lu, Y. Fu
Frontiers Big Data, 2021.Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
M. Ye, K. Zubair, D. Mohaisen, A. Awad
IEEE Trans. Dependable Secur. Comput., 2021.TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
A. Alabduljabbar, A. Abusnaina, U. Meteriz-Yildiran, D. Mohaisen
ACM WPES, Virtual Event, Korea, 2021.Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
IEEE DSN, Taipei, Taiwan, Supplemental Volume, 2021
🏅 Best Paper Award (Extended Abstract)SyncAttack: Double-spending in Bitcoin Without Mining Power
M. Saad, S. Chen, D. Mohaisen
ACM CCS, Virtual Event, Republic of Korea, 2021Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics
M. Abuhamad, A. Abusnaina, D. Nyang, D. Mohaisen
IEEE Internet Things J., 2021.Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis
M. Alkinoon, M. O., M. Mohaisen, D. Mohaisen
CSoNet, Virtual Event, 2021.SSD-Assisted Ransomware Detection and Data Recovery Techniques
S. Baek, Y. Jung, D. Mohaisen, S. Lee, D. Nyang
IEEE Trans. Computers, 2021.SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals
U. Meteriz-Yildiran, N. Yildiran, D. Mohaisen
ACM WPES, Virtual Event, Korea, 2021.Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization
M. Saad, S. Chen, D. Mohaisen
IEEE ICDCS, Washington DC, USA, 2021.Revisiting Nakamoto Consensus in Asynchronous Networks
M. Saad, A. Anwar, S. Ravi, D. Mohaisen
ACM CCS, Virtual Event, Republic of Korea, 2021.ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs.
M. Al-Wadi, D. Mohaisen, A. Awad
ACM ICS, Virtual Event, USA, 2021.
🏅 Best Paper Award NomineePerformance Evaluation of Consensus Protocols in Blockchain-based Audit Systems
A. Ahmad, M. Saad, J. Kim, D. Nyang, D. Mohaisen
ICOIN, Jeju Island, South Korea, 2021.Measuring Healthcare Data Breaches
M. Alkinoon, Sung Choi, D. Mohaisen
WISA, Jeju Island, South Korea, Revised Selected Papers, 2021.ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
CoRR, 2021.Large-scale and Robust Code Authorship Identification with Deep Feature Learning
M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
ACM Trans. Priv. Secur., 2021.Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
S. Alshamrani, A. Abusnaina, M. Abuhamad, D. Nyang, D. Mohaisen
CoRR, 2021.Empirically comparing the performance of blockchain’s consensus algorithms
A. Ahmad, A. Alabduljabbar, M. Saad, D. Nyang, J. Kim, D. Mohaisen
IET Blockchain, 2021.Domain name system security and privacy: A contemporary survey
A. Khormali, J. Park, H. Alasmary, A. Anwar, M. Saad, D. Mohaisen
Comput. Networks, 2021.Count-Less: A Counting Sketch for the Data Plane of High Speed Switches
Sunyoung Kim, C. Jung, R. Jang, D. Mohaisen, D. Nyang
CoRR, 2021.Contra-: Mechanisms for countering spam attacks on blockchain’s memory pools*
M. Saad, J. Kim, D. Nyang, D. Mohaisen,
J. Netw. Comput. Appl., 2021.Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks
Myungjae Shin, D. Mohaisen, J. Kim
ICOIN, Jeju Island, South Korea, 2021.Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations
A. Alabduljabbar, A. Abusnaina, U. Meteriz-Yildiran, D. Mohaisen
ACM CCS, Virtual Event, Republic of Korea, 2021.Adversarial Example Detection Using Latent Neighborhood Graph
A. Abusnaina, Y. Wu, S. Arora, Y. Wang, Fei Wang, H. Yang, D. Mohaisen
IEEE ICCV, Montreal, QC, Canada, 2021.A network-independent tool-based usable authentication system for Internet of Things devices
C. Jung, J. Choi, R. Jang, D. Mohaisen, D. Nyang
Comput. Secur., 2021.Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J. Choi, M. Abuhamad, A. Abusnaina, A. Anwar, S. Alshamrani, J. Park, D. Nyang, D. Mohaisen,
IEEE Access, 2020.“Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.”
U. Meteriz, Necip Yildiran, J. Kim, D. Mohaisen
IEEE ICDCS, Singapore, 2020.Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions
M. Saad, J. Choi, D. Nyang, J. Kim, D. Mohaisen
IEEE Syst. J., 2020
🏅 Best Paper Award
Also in IEEE INFOCOM Workshops, Honolulu, HI, USA, 2018“Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.”
A. Anwar, H. Alasmary, J. Park, A. Wang, S. Chen, D. Mohaisen
ICICS, Copenhagen, Denmark, 2020.Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
H. Alasmary, A. Abusnaina, R. Jang, M. Abuhamad, A. Anwar, D. Nyang, D. Mohaisen,
IEEE ICDCS, Singapore, 2020.SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
R. Jang, D. Min, S. Moon, D. Mohaisen, D. Nyang
IEEE INFOCOM, Toronto, ON, Canada, 2020.Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching
D. Kwon, J. Kim, D. Mohaisen, W. Lee
J. Commun. Networks, 2020.Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles
S. Park, J. Park, D. Mohaisen, J. Kim
CoRR, 2020.Multi-(chi): Identifying Multiple Authors from Source Code Files
M. Abuhamad, T. AbuHmed, D. Nyang, D. Mohaisen
Proc. Priv. Enhancing Technol., 2020.Measuring the Cost of Software Vulnerabilities
A. Anwar, A. Khormali, J. Choi, H. Alasmary, S. Salem, D. Nyang, D. Mohaisen
EAI Endorsed Trans. Security Safety, 2020
Also in EAI SecureComm (full paper), Singapore, 2018
Also in ACM AsiaCCS (poster), Incheon, Republic of Korea, 2018Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation
D. Mohaisen, Z. Gu, K. Ren, Z. Li, C. Kamhoua, L. Njilla, D. Nyang
IEEE Trans. Dependable Secur. Comput., 2020.Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube
S. Alshamrani, M. Abuhamad, A. Abusnaina, D. Mohaisen
SocialNLP@CIKM, Galway, Ireland, 2020.Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
A. Abusnaina, M. Abuhamad, D. Nyang, S. Chen, A. Wang, D. Mohaisen
WISA, Jeju Island, South Korea, Revised Selected Papers, 2020.Hiding in Plain Sight: A Measurement and Analysis of Kids’ Exposure to Malicious URLs on YouTube
S. Alshamrani, A. Abusnaina, D. Mohaisen
CoRR, 2020.Generating Adversarial Examples with an Optimized Quality
A. Khormali, D. Nyang, D. Mohaisen
CoRR, 2020.From Blue-Sky to Practical Adversarial Learning
A. Khormali, A. Abusnaina, S. Chen, D. Nyang, D. Mohaisen
IEEE TPS-ISA, Atlanta, GA, USA, 2020.Exploring the Attack Surface of Blockchain: A Comprehensive Survey
M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, D. Mohaisen
IEEE Commun. Surv. Tutorials, 2020.DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A. Abusnaina, R. Jang, A. Khormali, D. Nyang, D. Mohaisen
IEEE INFOCOM, Toronto, ON, Canada, 2020.Contra-: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools*
M. Saad, J. Kim, D. Nyang, D. Mohaisen
CoRR, 2020.Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
R. Jang, J. Kang, D. Mohaisen, D. Nyang
IEEE Trans. Mob. Comput., 2020.Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions
J. Park, M. Mohaisen, D. Nyang, D. Mohaisen
Comput. Networks, 2020.An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments
S. Alshamrani, A. Abusnaina, M. Abuhamad, A. Lee, D. Nyang, D. Mohaisen
CSoNet, Dallas, TX, USA, 2020.AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
IEEE Internet Things J., 2020.A Data-Driven Study of DDoS Attacks and Their Dynamics
A. Wang, W. Chang, S. Chen, D. Mohaisen
IEEE Trans. Dependable Secur. Comput., 2020.XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)
A. Wang, D. Mohaisen, S. Chen
IEEE ICDCS, Dallas, TX, USA, 2019.Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers
J. Park, A. Khormali, M. Mohaisen, D. Mohaisen
IEEE DSN, Portland, OR, USA, 2019
Also ACM CoNEXT (poster), Orlando, FL, USA, 2019.Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems
Laihyuk Park, Chunghyun Lee, J. Kim, D. Mohaisen, Sungrae Cho
IEEE Internet Things J., 2019.Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
J. Park, J. Choi, D. Nyang, D. Mohaisen
IEEE Trans. Netw. Serv. Manag., 2019.Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT
J. Spaulding, J. Park, J. Kim, D. Nyang, D. Mohaisen
Trans. Emerg. Telecommun. Technol., 2019.Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems
A. Abusnaina, H. Alasmary, M. Abuhamad, S. Salem, D. Nyang, D. Mohaisen
CSoNet, Ho Chi Minh City, Vietnam, 2019.Secure and transparent audit logs with emphBlockAudit
A. Ahmad, M. Saad, D. Mohaisen
J. Netw. Comput. Appl., 2019.Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table
R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
CoRR, 2019.RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing
M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yuksel, D. Mohaisen
IEEE ICBC, Seoul, Korea (South), 2019.Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
J. Jeon, J. Kim, J. Kim, K. Kim, D. Mohaisen, J.-K. Kim
IEEE DSN, Portland, OR, USA, Supplemental Volume, 2019.Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones
F. Dang, E. Zhai, Z. Li, P. Zhou, D. Mohaisen, K. Bian, Q. Wen, M. Li
IEEE Trans. Mob. Comput., 2019
Also in IEEE INFOCOM, Atlanta, GA, USA, 2017Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
M. Saad, V. Cook, Lan Nguyen, M. Thai, D. Mohaisen
IEEE ICDCS, Dallas, TX, USA, 2019.Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, D. Mohaisen
IEEE ICBC, Seoul, Korea (South), 2019.IoT malware ecosystem in the wild: a glimpse into analysis and exposures
J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang, D. Mohaisen
ACM/IEEE SEC, Arlington, Virginia, USA, 2019.InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
IEEE ICDCS, Dallas, TX, USA, 2019.Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J. Choi, A. Abusnaina, A. Anwar, A. Wang, S. Chen, D. Nyang, D. Mohaisen
IEEE DSC, Hangzhou, China, 2019.Fighting Fake News Propagation with Blockchains
M. Saad, A. Ahmad, D. Mohaisen
IEEE CNS, Washington, DC, USA, 2019.A. Abusnaina, A. Khormali, D. Nyang, M. Yuksel, D. Mohaisen
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
IEEE DSC, Hangzhou, China, 2019
🏅 Best Ppaper – Runner Up
Also in ACM CoNEXT (poster), Orlando, FL, USA, 2019Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
M. Saad, A. Khormali, D. Mohaisen
eCrime, Pittsburgh, PA, USA, 2019.Detecting and Classifying Android Malware using Static Analysis along with Creator Information
H.-J. Kang, J.-w. Jang, D. Mohaisen, H. Kim,
CoRR, 2019.Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
J. Park, D. Mohaisen, C. Kamhoua, Michael Weisman, Nandi Leslie, L. Njilla
WISA, Jeju Island, South Korea, Revised Selected Papers, 2019.Countering Selfish Mining in Blockchains
M. Saad, L. Njilla, C. Kamhoua, D. Mohaisen
IEEE ICNC, Honolulu, HI, USA, 2019.Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One
D. Mohaisen, S. Chen
IEEE ISA, 2019.COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
A. Khormali, A. Abusnaina, S. Chen, D. Nyang, Aziz Mohaisen
CoRR, 2019.“Poster: Breaking graph-based IoT malware detection systems using adversarial examples.”
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz, D. Mohaisen
ACM WiSec, Miami, Florida, USA, 2019.“BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.”
A. Ahmad, M. Saad, L. Njilla, C. Kamhoua, M. Bassiouni, D. Mohaisen
IEEE ICC, Shanghai, China, 2019.Android Malware Detection Using Complex-Flows
Feng Shen, Justin Vecchio, D. Mohaisen, S. Ko, Lukasz Ziarek
IEEE Trans. Mob. Comput., 2019
Also appeared in IEEE ICDCS (short paper), Atlanta, GA, USA, 2017
Also appeared in ACM MobiSys (poster), Niagara Falls, NY, USA, 2017Poster: Analyzing endpoints in the internet of things malware
J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang, D. Mohaisen
ACM WiSec, Miami, Florida, USA, 2019.Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, Amro Awad, D. Nyang, D. Mohaisen
IEEE Internet Things J., 2019.Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, D. Mohaisen
IEEE ICDCS, Dallas, TX, USA, 2019.Poster: A cost-effective anomaly detection system using in-DRAM working set of active flows table
R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
ACM WiSec, Miami, Florida, USA, 2019.A Privacy-Preserving Longevity Study of Tor’s Hidden Services
A. Sanatinia, J. Park, E.-O. Blass, D. Mohaisen, G. Noubir
CoRR, 2019.XMSS: eXtended Merkle Signature Scheme
Andreas Hulsing, D. Butin, Stefan{-}Lukas Gazdag, Joost Rijneveld, D. Mohaisen
IETF RFC, 2018.Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
D. Nyang, H. Kim, W. Lee, S. Kang, G. Cho, M. Lee, D. Mohaisen
Comput. Secur., 2018.Towards Blockchain-Driven, Secure and Transparent Audit Logs
A. Ahmad, M. Saad, M. Bassiouni, D. Mohaisen
DLoT@MobiQuitous, New York City, NY, USA, 2018
🏅 Best Paper AwardTiming is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks
J. Park, D. Nyang, D. Mohaisen
IEEE PST, Belfast, Northern Ireland, Uk, 2018.ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture
S. Ahn, J. Kim, E. Lim, W. Choi, D. Mohaisen, S. Kang
IEEE ICDCS, Vienna, Austria, 2018.SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery
S. Baek, Y. Jung, D. Mohaisen, S. Lee, D. Nyang
IEEE ICDCS, Vienna, Austria, 2018.QOI: Assessing Participation in Threat Information Sharing
J. Park, H. Alasmary, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla, D. Mohaisen
IEEE ICASSP, Calgary, AB, Canada, 2018.Proactive detection of algorithmically generated malicious domains
J. Spaulding, J. Park, J. Kim, D. Mohaisen
ICOIN, Chiang Mai, Thailand, 2018.POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization
M. Saad, My Thai, D. Mohaisen
ACM AsiaCCS, Incheon, Republic of Korea, 2018.Neural Network Syntax Analyzer for Embedded Standardized Deep Learning
M. Shin, J. Kim, D. Mohaisen, J. Park, K. Lee
EMDL@MobiSys, Munich, Germany, 2018.Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering
D. Mohaisen, O. Alrawi, J. Park, J. Kim, D. Nyang, M. Mohaisen
EAI Endorsed Trans. Security Safety, 2018.Large-Scale and Language-Oblivious Code Authorship Identification
M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
ACM CCS, Toronto, ON, Canada, 2018.Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks
D. Kwon, Sang{-}Wook Kim, J. Kim, D. Mohaisen
Sensors, 2018.Graph-Based Comparison of IoT and Android Malware
H. Alasmary, A. Anwar, J. Park, J. Choi, D. Nyang, D. Mohaisen
CSoNet, Shanghai, China, 2018.Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions
C. Jung, J. Kang, D. Mohaisen, D. Nyang
IEEE ICASSP, Calgary, AB, Canada, 2018.Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
A. Wang, W. Chang, S. Chen, D. Mohaisen
IEEE/ACM Trans. Netw., 2018.Defending Internet of Things Against Malicious Domain Names using D-FENS
J. Spaulding, D. Mohaisen
IEEE/ACM SEC Workshops, Seattle, WA, USA, 2018.Countering Selfish Mining in Blockchains
M. Saad, L. Njilla, C. Kamhoua, D. Mohaisen
IEEE ICNC, 2018.ABC: Enabling Smartphone Authentication with Built-in Camera
Z. Ba, S. Piao, X. Fu, D. Koutsonikolas, D. Mohaisen, K. Ren
ISOC NDSS, San Diego, California, USA, 2018.You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques
J. Spaulding, S. Upadhyaya, D. Mohaisen
IEEE ICDCS, Atlanta, GA, USA, 2017.You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones
Si Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, D. Mohaisen
IEEE ICDCS 2017, Atlanta, GA, USA, 2017.When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
C. Guan, D. Mohaisen, Z. Sun, L. Su, K. Ren, Y. Yang
IEEE ICDCS 2017, Atlanta, GA, USA, 2017.Understanding the effectiveness of typosquatting techniques
J. Spaulding, D. Nyang, D. Mohaisen
ACM/IEEE HotWeb 2017, San Jose / Silicon Valley, CA, USA, 2017.Understanding Adversarial Strategies from Bot Recruitment to Scheduling
W. Chang, D. Mohaisen, A. Wang, S. Chen
EAI SecureComm, Niagara Falls, ON, Canada, 2017.Poster: Two-level network monitoring and management in WLAN using software-defined networking
R. Jang, D. Cho, D. Mohaisen, Y. Noh, D. Nyang
ACM WiSec, Boston, MA, USA, 2017.SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Q. Wang, K. Ren, M. Du, Q. Li, D. Mohaisen
Financial Crypto, Sliema, Malta, Revised Selected Papers, 2017.Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
R. Jang, J. Kang, D. Mohaisen, D. Nyang
IEEE ICDCS, Atlanta, GA, USA, 2017.Rethinking information sharing for threat intelligence
D. Mohaisen, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla
ACM/IEEE HotWeb, San Jose / Silicon Valley, CA, USA, 2017.Privacy Implications of DNSSEC Look-Aside Validation
D. Mohaisen, Z. Gu, K. Ren
IEEE ICDCS, Atlanta, GA, USA, 2017.
Also in IEEE PAC, 2017 (poster).Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms
Y. Mo, J. Kim, J.-K. Kim, D. Mohaisen, W. Lee
IEEE ICUFN, Milan, Italy, 2017.Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
D. Mohaisen, K. Ren
IEEE/ACM Trans. Netw., 2017.Highly-accurate rogue access point detection using intentional channel interference: poster
R. Jang, J. Kang, D. Mohaisen, D. Nyang
ACM WiSec, Boston, MA, USA, 2017.Distributed and reliable decision-making for cloud-enabled mobile service platforms
J. Kim, D. Mohaisen
Int. J. Distributed Sens. Networks, 2017.Crime Scene Reconstruction: Online Gold Farming Network Analysis
H. Kwon, D. Mohaisen, J. Woo, Y. Kim, E. Lee, H. Kim,
IEEE Trans. Inf. Forensics Secur., 2017.An Adversary-Centric Behavior Modeling of DDoS Attacks
A. Wang, D. Mohaisen, S. Chen
IEEE ICDCS, Atlanta, GA, USA, 2017.You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild E. Lee, J. Woo, H. Kim, D. Mohaisen, H. Kim
ISOC NDSS, San Diego, California, USA, 2016.Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
A. Kang, S. Jeong, S. Ko, K. Ren, D. Mohaisen
IEEE/ACM HotWeb, Washington, DC, USA, 2016.The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
J. Spaulding, S. Upadhyaya, D. Mohaisen
ARES, Salzburg, Austria, 2016.Private Over-Threshold Aggregation Protocols over Distributed Datasets
M. Kim, D. Mohaisen, J. Cheon, Y. Kim
IEEE Trans. Knowl. Data Eng., 2016.Multimodal Game Bot Detection using User Behavioral Characteristics
A. Kang, S. Jeong, D. Mohaisen, H. Kim
CoRR, 2016.Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks
A. Wang, D. Mohaisen, W. Chang, S. Chen
WISA, Jeju Island, Korea, Revised Selected Papers, 2016.Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph
J.-w. Jang, J. Woo, D. Mohaisen, J. Yun, H. Kim
CoRR, 2016.Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
O. Alrawi, D. Mohaisen
WWW Companion, Montreal, Canada, 2016.Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles
J.-w. Jang, J. Yun, D. Mohaisen, J. Woo, H. Kim
CoRR, 2016.Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J.-w. Jang, H.-J. Kang, J. Woo, D. Mohaisen, H. Kim
Comput. Secur., 2016.A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure
S. Jeong, A. Kang, J. Kim, H. Kim, D. Mohaisen
ACM SIGCOMM (poster), Florianopolis, Brazil, 2016.Transaction authentication using complementary colors
Y. Maeng, D. Mohaisen, M. Lee, D. Nyang
Comput. Secur., 2015.Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents
D. Mohaisen
ACM/IEEE HotWeb, Washington, DC, USA, 2015.Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
D. Mohaisen, H. Mekky, X. Zhang, H. Xie, Y. Kim
IEEE Trans. Dependable Secur. Comput., 2015.Separation of benign and malicious network events for accurate malware family classification
H. Mekky, D. Mohaisen, Z.-L. Zhang
IEEE CNS, Florence, Italy, 2015.
ACM CCS (poster), Scottsdale, AZ, USA, 2014.Measuring Botnets in the Wild: Some New Trends
W. Chang, D. Mohaisen, A. Wang, S. Chen
ACM ASIACCS, Singapore, 2015.Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H.-J. Kang, J.-w. Jang, D. Mohaisen, H. Kim
Int. J. Distributed Sens. Networks, 2015.Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis
A. Wang, D. Mohaisen, W. Chang, S. Chen
IEEE DSN, Rio de Janeiro, Brazil, 2015.Capturing DDoS Attack Dynamics Behind the Scenes
A. Wang, D. Mohaisen, W. Chang, S. Chen
DIMVA, Milan, Italy, 2015.Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J.-w. Jang, Hyunjae Kang, J. Woo, D. Mohaisen, H. Kim
Digit. Investig., 2015.AMAL: High-fidelity, behavior-based automated malware analysis and classification
D. Mohaisen, O. Alrawi, M. Mohaisen
Comput. Secur., 2015.Trustworthy Distributed Computing on Social Networks
D. Mohaisen, H. Tran, A. Chandra, Y. Kim
IEEE Trans. Serv. Comput., 2014.Parallel QRD-M encoder for multi-user MIMO systems
M. Mohaisen, D. Mohaisen, M. Debbah
Telecommun. Syst., 2014.POSTER: How Distributed Are Today’s DDoS Attacks?
A. Wang, W. Chang, D. Mohaisen, S. Chen
ACM CCS, Scottsdale, AZ, USA, 2014.Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
D. Mohaisen, M. Bhuiyan, Y. Labrou
WISA, Jeju Island, Korea, Revised Selected Papers, 2014.Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware
A. West, D. Mohaisen
DIMVA, Egham, UK, 2014.Measuring the Leakage of Onion at the Root: A measurement of Tor’s .onion pseudo-TLD in the global domain name system
M. Thomas, D. Mohaisen
ACM WPES, Scottsdale, AZ, USA, 2014.Kindred domains: detecting and clustering botnet domains using DNS traffic
M. Thomas, D. Mohaisen
WWW, Seoul, Republic of Korea, Companion Volume, 2014.Keylogging-Resistant Visual Authentication Protocols
D. Nyang, D. Mohaisen, J. Kang
IEEE Trans. Mob. Comput., 2014.Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks
J. Kim, D. Mohaisen, J.-K. Kim
IEEE Commun. Lett., 2014.Chatter: Classifying malware families using system event ordering
D. Mohaisen, A. West, A. Mankin, O. Alrawi
IEEE CNS, San Francisco, CA, USA, 2014.Characterizing botnets-as-a-service
W. Chang, A. Wang, D. Mohaisen, S. Chen
ACM SIGCOMM, Chicago, IL, USA, 2014.AV-Meter: An Evaluation of Antivirus Scans and Labels
D. Mohaisen, O. Alrawi
DIMVA, Egham, UK, 2014.AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
D. Mohaisen, O. Alrawi
WISA, Jeju Island, Korea, Revised Selected Papers, 2014
🏅 Best Paper AwardA. Kosba, D. Mohaisen, A. West, T. Tonn, H. Kim
ADAM: Automated Detection and Attribution of Malicious Webpages
WISA, Jeju Island, Korea, Revised Selected Papers, 2014.A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain
Y. Song, H. Kim, D. Mohaisen
TrustBus, Munich, Germany, 2014.Unveiling Zeus: automated classification of malware samples
D. Mohaisen, O. Alrawi
WWW, Rio de Janeiro, Brazil, Companion Volume, 2013.Trustworthy distributed computing on social networks
D. Mohaisen, H. Tran, A. Chandra, Y. Kim
ACM ASIACCS, Hangzhou, China, 2013.Trading Optimality for Scalability in Large-Scale Opportunistic Routing
Y. Li, D. Mohaisen, Z.-L. Zhang
IEEE Trans. Veh. Technol., 2013.Towards a Methodical Evaluation of Antivirus Scans and Labels
D. Mohaisen, O. Alrawi, M. Larson, D. McPherson
WISA, Jeju Island, Korea, Revised Selected Papers, 2013.Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
D. Mohaisen, D. Kune, E. Vasserman, M. Kim, Y. Kim
IEEE Trans. Dependable Secur. Comput., 2013
Also in ACM CCS (poster), Chicago, Illinois, USA, 2010.Protecting access privacy of cached contents in information centric networks
D. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim
ACM AsiaCCS, Hangzhou, China, 2013.Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs
D. Mohaisen, S. Hollenbeck
WISA, Jeju Island, Korea, Revised Selected Papers, 2013.Dynamix: anonymity on dynamic social structures
D. Mohaisen, Y. Kim
ACM AsiaCCS, Hangzhou, China, 2013.Poster: Characterization of the dynamics and interactions of domain names and name serve
M. Bhuiyan, D. Mohaisen, Y. Labrou, M. Hasan
IEEE CNS, National Harbor, MD, USA, 2013.Poster: Babble: Identifying malware by its dialects
D. Mohaisen, O. Alrawi, A. West, A. Mankin
IEEE CNS, National Harbor, MD, USA, 2013.Poster: ADAM: Automated detection and attribution of malicious webpages
A. Kosba, D. Mohaisen, A. West, T. Tonn
IEEE CNS, National Harbor, MD, USA, 2013
🏅 Best Poster AwardProtecting access privacy of cached contents in information centric networks
D. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim
ACM CCS, Raleigh, NC, USA, 2012.Private Over-Threshold Aggregation Protocols
M. Kim, D. Mohaisen, J. Cheon, Y. Kim
ICISC, Seoul, Korea, Revised Selected Papers, 2012.On the mixing time of directed social graphs and security implications
D. Mohaisen, H. Tran, N. Hopper, Y. Kim
ACM AsiaCCS, Seoul, Korea, 2012.Measuring bias in the mixing time of social graphs due to graph sampling
D. Mohaisen, PengK. Luo, Y. Li, Y. Kim, Z.-L. Zhang
IEEE MILCOM, Orlando, FL, USA, 2012.DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
T. Zhu, D. Mohaisen, Y. Ping, D. Towsley
IEEE INFOCOM, Orlando, FL, USA, 2012.Collaboration in social network-based information dissemination
D. Mohaisen, T. AbuHmed, T. Zhu, M. Mohaisen
IEEE ICC, Ottawa, ON, Canada, 2012.Understanding Social Networks Properties for Trustworthy Computing
D. Mohaisen, H. Tran, N. Hopper, Y. Kim
IEEE ICDCS Workshops, Minneapolis, Minnesota, USA, 2011.Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems
M. Mohaisen, D. Mohaisen, Y. Li, P. Luo
IEEE ICC, Kyoto, Japan, 2011.Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
M. Schuchard, D. Mohaisen, D. Kune, N. Hopper, Y. Kim, E. Vasserman
ISOC NDSS, San Diego, California, USA, 2011.
Also ACM CCS (poster), Chicago, Illinois, USA, 2010.Keep your friends close: Incorporating trust into social network-based Sybil defenses
D. Mohaisen, N. Hopper, Y. Kim
IEEE INFOCOM, Shanghai, China, 2011.
Also ACM CCS (poster), Chicago, Illinois, USA, 2010.Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency
D. Mohaisen, N. Jho, D. Hong, D. Nyang
IEICE Trans. Inf. Syst., 2010.Measuring the mixing time of social graphs
D. Mohaisen, A. Yun, Y. Kim
ACM IMC, Melbourne, Australia, 2010.Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
D. Hong, D. Mohaisen
ETRI Journal, 2010.Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
D. Mohaisen, D. Hong
ETRI Journal, 2009.Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
D. Mohaisen, D. Nyang, K. Lee
Int. J. Netw. Secur., 2009.Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
D. Mohaisen, I. Jeong, D. Hong, N. Jho, D. Nyang
UIC, Oslo, Norway, 2008.A Survey on Deep Packet Inspection for Intrusion Detection Systems
T. AbuHmed, D. Mohaisen, D. Nyang
Korea Telecommunication Magazine, 2008.Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network
D. Mohaisen, D. Nyang, Y. Maeng, K. Lee
IEEE MSN, Beijing, China 2007.Secret Key Revocation in Sensor Networks
Y. Maeng, D. Mohaisen, D. Nyang
UIC, Hong Kong, China, 2007.On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network
D. Mohaisen, Y. Maeng, D. Nyang
PAKDD, Nanjing, China, Revised Selected Papers, 2007.Cooperative Public Key Authentication Protocol in Wireless Sensor Network
D. Nyang, D. Mohaisen
UIC, Wuhan, China, 2006.Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks
D. Mohaisen, D. Nyang
EWSN, Zurich, Switzerland, 2006.
Editorship
D. Mohaisen, R. Jin: Proceedings of the 10th International Conference on Computational Data and Social Networks, CSoNet 2021, Virtual Event, November 15-17, 2021. Lecture Notes in Computer Science 13116, Springer 2021, ISBN 978-3-030-91433-2
D. Mohaisen, Z.-L. Zhang: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019. ACM 2019, ISBN 978-1-4503-6998-5
S. Chen, K.-K. Choo, X. Fu, W. Lou, D. Mohaisen: Proceedings of the 15th EAI International Conference Security and Privacy in Communication Networks, SecureComm 2019, Part I, Orlando, FL, USA, October 23-25, 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9
S. Chen, K.-K. Choo, X. Fu, W. Lou, D. Mohaisen: Proceedings of the 15th EAI International Conference Security and Privacy in Communication Networks, SecureComm 2019, Part II, Orlando, FL, USA, October 23-25, 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9
D. Mohaisen, Q. Wang: Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018