Yazan Boshmaf
Yazan Boshmaf
Qatar Computing Research Institute, HBKU
Verified email at hbku.edu.qa - Homepage
TitleCited byYear
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th Annual Computer Security Applications Conference, 93-102, 2011
4382011
SIMD-scan: ultra fast in-memory table scan using on-chip vector processing units
T Willhalm, N Popovici, Y Boshmaf, H Plattner, A Zeier, J Schaffner
Proceedings of the VLDB Endowment 2 (1), 385-394, 2009
1892009
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Elsevier Computer Networks, 2012
1562012
Understanding users' requirements for data protection in smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference …, 2012
792012
Íntegro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
Network and Distributed System Security Symposium, 2015
772015
Know your enemy: the risk of unauthorized access in smartphones by insiders
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
Proceedings of the 15th international conference on Human-computer …, 2013
742013
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 New Security Paradigms Workshop, 61-72, 2010
712010
Key challenges in defending against malicious socialbots
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 5th USENIX workshop on large-scale exploits and emergent …, 2012
542012
Graph-based sybil detection in social and information systems
Y Boshmaf, K Beznosov, M Ripeanu
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
382013
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
Computers & Security 61, 142-168, 2016
222016
Method and system for predicting victim users and detecting fake user accounts in online social networks
Y Boshmaf, D Logothetis, G Siganos, TD ESPANA, SLU
US Patent 20,150,188,941, 2015
222015
To befriend or not? A model of friend request acceptance on Facebook
H Rashtian, Y Boshmaf, P Jaferian, K Beznosov
Symposium on Usable Privacy and Security (SOUPS), 2014
182014
Visualization of actionable knowledge to mitigate DRDoS attacks
M Aupetit, Y Zhauniarovich, G Vasiliadis, M Dacier, Y Boshmaf
Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on, 1-8, 2016
132016
Adaptive composition of distributed pervasive applications in heterogeneous environments
S Schuhmann, K Herrmann, K Rothermel, Y Boshmaf
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (2), 10, 2013
132013
Thwarting Fake OSN Accounts by Predicting their Victims
Y Boshmaf, M Ripeanu, K Beznosov, E Santos-Neto
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
112015
Interacting with large distributed datasets using Sketch
M Budiu, R Isaacs, D Murray, G Plotkin, P Barham, S Al-Kiswany, ...
Eurographics Symposium on Parallel Graphics and Visualization (EGPGV’16), 2016
92016
When A small leak sinks A great ship: Deanonymizing tor hidden service users through bitcoin transactions analysis
HA Jawaheri, MA Sabah, Y Boshmaf, A Erbad
arXiv preprint arXiv:1801.07501, 2018
62018
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population
H Halawa, K Beznosov, Y Boshmaf, B Coskun, M Ripeanu, E Santos-Neto
Proceedings of the 2016 New Security Paradigms Workshop, 11-22, 2016
52016
A Quick Survey of Social Network-based Sybil Defenses
Y Boshmaf
University of British Columbia, Vancouver, Canada, 2013
52013
Source Attribution of Cryptographic API Misuse in Android Applications
I Muslukhov, Y Boshmaf, K Beznosov
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20