Moheeb Abu Rajab
Moheeb Abu Rajab
Email verificata su google.com
Titolo
Citata da
Citata da
Anno
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
8322006
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6212008
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3172007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2502012
On the Effectiveness of Distributed Worm Monitoring.
MA Rajab, F Monrose, A Terzis
USENIX Security Symposium, 15, 2005
1152005
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
1132009
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
982015
CAMP: Content-agnostic malware protection
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
792013
The nocebo effect on the web: an analysis of fake anti-virus distribution
MA Rajab, L Ballard, P Marvrommatis, N Provos, X Zhao
772010
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
712008
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report, 2011
682011
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 579-593, 2015
622015
Investigating commercial pay-per-install and the distribution of unwanted software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 721-739, 2016
522016
Fast and evasive attacks: Highlighting the challenges ahead
MA Rajab, F Monrose, A Terzis
International Workshop on Recent Advances in Intrusion Detection, 206-225, 2006
422006
Requirements on worm mitigation technologies in MANETS
RG Cole, N Phamdo, MA Rajab, A Terzis
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 207-214, 2005
422005
On the impact of dynamic addressing on malware propagation
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 4th ACM workshop on Recurring malcode, 51-56, 2006
382006
Peeking through the cloud: DNS-based estimation and its applications
MA Rajab, F Monrose, A Terzis, N Provos
International Conference on Applied Cryptography and Network Security, 21-38, 2008
332008
Worm evolution tracking via timing analysis
M Abu Rajab, F Monrose, A Terzis
Proceedings of the 2005 ACM workshop on Rapid malcode, 52-59, 2005
332005
10th USENIX Security Symposium
DASSN Provos, P Mavrommatis, M Rajab, F Monrose
Washington, DC, August, 2001
112001
Exploration system and method for analyzing behavior of binary executable programs
MA Rajab, X Zhao, N Provos
US Patent 9,215,245, 2015
102015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20