Ali Zand
Ali Zand
Google
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
81*2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS, 2017
542017
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
502011
Targeted attacks against industrial control systems: Is the power industry prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 13-22, 2014
432014
Extracting Probable Command and Control Signatures for Detecting Botnets
A Zand, G Vigna, X Yan, C Kruegel
Symposium On Applied Computing (SAC), 2014
292014
Nexat: A history-based approach to predict attacker actions
C Cipriano, A Zand, A Houmansadr, C Kruegel, G Vigna
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
292011
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sedighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
252017
Rippler: Delay injection for service dependency detection
A Zand, G Vigna, R Kemmerer, C Kruegel
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2157-2165, 2014
222014
Demystifying DDoS as a service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
62017
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
42016
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
A Zand, A Houmansadr, G Vigna, R Kemmerer, C Kruegel
Proceedings of the 31st Annual Computer Security Applications Conference, 41-50, 2015
42015
A Voting-Based Architecture for Survivable Hierarchical IDSes
A Zand, B Sadeghian
2009
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and E ectiveness of Phishing Attacks at Scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
The system can't perform the operation now. Try again later.
Articles 1–13