Follow
Moheeb Abu Rajab
Moheeb Abu Rajab
Verified email at google.com
Title
Cited by
Cited by
Year
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
9652006
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6912008
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3382007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3042012
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1522015
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
1342009
On the Effectiveness of Distributed Worm Monitoring.
MA Rajab, F Monrose, A Terzis
USENIX Security Symposium, 15, 2005
1192005
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th USENIX Security Symposium (USENIX Security 15), 579-593, 2015
1082015
CAMP: Content-Agnostic Malware Protection.
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
NDSS, 2013
992013
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.
MA Rajab, L Ballard, P Mavrommatis, N Provos, X Zhao
LEET, 2010
922010
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
892016
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report 168, 2011
872011
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
812008
Fast and evasive attacks: Highlighting the challenges ahead
MA Rajab, F Monrose, A Terzis
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
452006
On the impact of dynamic addressing on malware propagation
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 4th ACM workshop on Recurring malcode, 51-56, 2006
442006
Requirements on worm mitigation technologies in MANETS
RG Cole, N Phamdo, MA Rajab, A Terzis
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 207-214, 2005
422005
Peeking through the cloud: DNS-based estimation and its applications
MA Rajab, F Monrose, A Terzis, N Provos
Applied Cryptography and Network Security: 6th International Conference …, 2008
392008
Worm evolution tracking via timing analysis
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 2005 ACM workshop on Rapid malcode, 52-59, 2005
342005
Exploration system and method for analyzing behavior of binary executable programs
MA Rajab, X Zhao, N Provos
US Patent 9,215,245, 2015
172015
Peeking through the cloud: Client density estimation via dns cache probing
MA Rajab, F Monrose, N Provos
ACM Transactions on Internet Technology (TOIT) 10 (3), 1-21, 2010
132010
The system can't perform the operation now. Try again later.
Articles 1–20