Yacin Nadji
Yacin Nadji
Affiliazione sconosciuta
Email verificata su gatech.edu - Home page
TitoloCitata daAnno
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
436*
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Y Nadji, P Saxena, D Song
NDSS 20, 2009
2392009
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
682013
Automated remote repair for mobile malware
Y Nadji, J Giffin, P Traynor
Proceedings of the 27th Annual Computer Security Applications Conferenceá…, 2011
602011
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee
2014 44th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2014
382014
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
322016
Connected colors: Unveiling the structure of criminal networks
Y Nadji, M Antonakakis, R Perdisci, W Lee
International Workshop on Recent Advances in Intrusion Detection, 390-410, 2013
272013
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defensesá…, 2016
262016
MalwareVis: entity-based visualization of malware network traces
W Zhuo, Y Nadjin
Proceedings of the ninth international symposium on visualization for cyberá…, 2012
212012
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
192017
Understanding the privacy implications of ecs
P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis
International Conference on Detection of Intrusions and Malware, andá…, 2016
172016
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games
Y Nadji, M Antonakakis, R Perdisci, W Lee
172011
Domain-Z: 28 registrations later
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
37th IEEE Symposium on Security and Privacy, 2016
122016
Financial lower bounds of online advertising abuse
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
International conference on Detection of Intrusions and Malware, andá…, 2016
112016
Just awful enough: the functional dysfunction of the something awful forums
JA Pater, Y Nadji, ED Mynatt, AS Bruckman
Proceedings of the 32nd annual ACM conference on Human factors in computingá…, 2014
112014
Still beheading hydras: Botnet takedowns then and now
Y Nadji, R Perdisci, M Antonakakis
IEEE Transactions on Dependable and Secure Computing 14 (5), 535-549, 2015
92015
Measuring network reputation in the ad-bidding process
Y Chen, Y Nadji, R Romero-Gˇmez, M Antonakakis, D Dagon
International Conference on Detection of Intrusions and Malware, andá…, 2017
72017
Towards designing effective visualizations for DNS-based network threat analysis
R Romero-Gomez, Y Nadji, M Antonakakis
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
62017
See No Evil: Evasions in Honeymonkey Systems
B Dolan-Gavitt, Y Nadji
Technical Report, 2010
52010
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
42017
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20