Ali Zand
Ali Zand
Google
Email verificata su cs.ucsb.edu - Home page
TitoloCitata daAnno
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS, 2017
422017
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
422011
Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
372017
Targeted attacks against industrial control systems: Is the power industry prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 13-22, 2014
372014
Nexat: A history-based approach to predict attacker actions
C Cipriano, A Zand, A Houmansadr, C Kruegel, G Vigna
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
262011
Rippler: Delay injection for service dependency detection
A Zand, G Vigna, R Kemmerer, C Kruegel
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2157-2165, 2014
212014
Extracting Probable Command and Control Signatures for Detecting Botnets
A Zand, G Vigna, X Yan, C Kruegel
Symposium On Applied Computing (SAC), 2014
212014
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sedighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
142017
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein, Data Breaches, Phishing, or Malware?: Understanding the Risks of …
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
112017
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al. 2017. Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proc. CCS, 0
7
Data breaches, phishing, or malware
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Understanding the risks of stolen credentials, 2017
62017
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
62016
Demystifying DDoS as a Service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
32017
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
A Zand, A Houmansadr, G Vigna, R Kemmerer, C Kruegel
Proceedings of the 31st Annual Computer Security Applications Conference, 41-50, 2015
22015
Ranking Security-Important Assets in a Corporate Network
A Zand, C Kruegel, R Kemmerer, G Vigna
GSWC 2011, 13, 2011
2011
A Voting-Based Architecture for Survivable Hierarchical IDSes
A Zand, B Sadeghian
2009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16