Follow
Zhibo Sun
Zhibo Sun
Verified email at drexel.edu - Homepage
Title
Cited by
Cited by
Year
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
462021
Towards automated threat intelligence fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
362016
Dart: A geographic information system on hadoop
H Zhang, Z Sun, Z Liu, C Xu, L Wang
2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015
292015
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
232020
RTIDS: A robust transformer-based approach for intrusion detection system
Z Wu, H Zhang, P Wang, Z Sun
IEEE Access 10, 64375-64387, 2022
122022
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
112019
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
92021
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter
Z Sun, H Zhang, Z Liu, C Xu, L Wang
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016
92016
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization
Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic
2014 International Conference on Virtual Reality and Visualization, 186-193, 2014
22014
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
Z Sun
Arizona State University, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–11