Prati
Yacin Nadji
Naslov
Citirano
Citirano
Godina
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
765*
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Y Nadji, P Saxena, D Song
NDSS 20, 2009
2842009
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1052013
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE symposium on security and privacy (SP), 691-706, 2016
1032016
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1012017
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
982016
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
692014
Automated remote repair for mobile malware
Y Nadji, J Giffin, P Traynor
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
642011
Connected colors: Unveiling the structure of criminal networks
Y Nadji, M Antonakakis, R Perdisci, W Lee
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
362013
MalwareVis: entity-based visualization of malware network traces
W Zhuo, Y Nadjin
Proceedings of the ninth international symposium on visualization for cyber …, 2012
342012
Just awful enough: the functional dysfunction of the something awful forums
JA Pater, Y Nadji, ED Mynatt, AS Bruckman
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
332014
Understanding the privacy implications of ecs
P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
292016
Towards designing effective visualizations for DNS-based network threat analysis
R Romero-Gomez, Y Nadji, M Antonakakis
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
252017
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games
Y Nadji, M Antonakakis, R Perdisci, W Lee
232011
Financial Lower Bounds of Online Advertising Abuse: A Four Year Case Study of the TDSS/TDL4 Botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
212016
Still beheading hydras: Botnet takedowns then and now
Y Nadji, R Perdisci, M Antonakakis
IEEE Transactions on Dependable and Secure Computing 14 (5), 535-549, 2015
212015
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
112017
Measuring network reputation in the ad-bidding process
Y Chen, Y Nadji, R Romero-Gómez, M Antonakakis, D Dagon
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
102017
See no evil: Evasions in honeymonkey systems
B Dolan-Gavitt, Y Nadji
Technical report, Technical Report, 2010
72010
Dawn of the dead domain: Measuring the exploitation of residual trust in domains
C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
IEEE Security & Privacy 15 (2), 70-77, 2017
32017
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20