Yazan Boshmaf
Yazan Boshmaf
Qatar Computing Research Institute, HBKU
Verified email at hbku.edu.qa - Homepage
Cited by
Cited by
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th Annual Computer Security Applications Conference, 93-102, 2011
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Elsevier Computer Networks, 2012
SIMD-scan: ultra fast in-memory table scan using on-chip vector processing units
T Willhalm, N Popovici, Y Boshmaf, H Plattner, A Zeier, J Schaffner
Proceedings of the VLDB Endowment 2 (1), 385-394, 2009
Íntegro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
Network and Distributed System Security Symposium, 2015
Understanding users' requirements for data protection in smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference …, 2012
Know your enemy: the risk of unauthorized access in smartphones by insiders
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
Proceedings of the 15th international conference on Human-computer …, 2013
Key challenges in defending against malicious socialbots
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 5th USENIX workshop on large-scale exploits and emergent …, 2012
A billion keys, but few locks: the crisis of web single sign-on
ST Sun, Y Boshmaf, K Hawkey, K Beznosov
Proceedings of the 2010 New Security Paradigms Workshop, 61-72, 2010
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
Computers & Security 61, 142-168, 2016
Graph-based sybil detection in social and information systems
Y Boshmaf, K Beznosov, M Ripeanu
2013 IEEE/ACM International Conference on Advances in Social Networks …, 2013
Method and system for predicting victim users and detecting fake user accounts in online social networks
Y Boshmaf, D Logothetis, G Siganos, TD ESPANA, SLU
US Patent 20,150,188,941, 2015
To befriend or not? A model of friend request acceptance on Facebook
H Rashtian, Y Boshmaf, P Jaferian, K Beznosov
Symposium on Usable Privacy and Security (SOUPS), 2014
Deanonymizing tor hidden service users through bitcoin transactions analysis
HA Jawaheri, MA Sabah, Y Boshmaf, A Erbad
arXiv preprint arXiv:1801.07501, 2018
Visualization of actionable knowledge to mitigate DRDoS attacks
M Aupetit, Y Zhauniarovich, G Vasiliadis, M Dacier, Y Boshmaf
Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on, 1-8, 2016
Thwarting Fake OSN Accounts by Predicting their Victims
Y Boshmaf, M Ripeanu, K Beznosov, E Santos-Neto
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
Adaptive composition of distributed pervasive applications in heterogeneous environments
S Schuhmann, K Herrmann, K Rothermel, Y Boshmaf
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (2), 1-21, 2013
Source attribution of cryptographic API misuse in android applications
I Muslukhov, Y Boshmaf, K Beznosov
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Interacting with large distributed datasets using Sketch
M Budiu, R Isaacs, D Murray, G Plotkin, P Barham, S Al-Kiswany, ...
Eurographics Symposium on Parallel Graphics and Visualization (EGPGV’16), 2016
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population
H Halawa, K Beznosov, Y Boshmaf, B Coskun, M Ripeanu, E Santos-Neto
Proceedings of the 2016 new security paradigms workshop, 11-22, 2016
BlockTag: design and applications of a tagging system for blockchain analysis
Y Boshmaf, H Al Jawaheri, M Al Sabah
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20