Detection of early-stage enterprise infection by mining large-scale log data A Oprea, Z Li, TF Yen, SH Chin, S Alrwais 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 239 | 2015 |
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data O Alina, L Zhou, YT Fang, CH Sang, A Sumayah Proceedings of the International Conference on Dependable Systems and …, 2015 | 239* | 2015 |
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures Z Li, S Alrwais, Y Xie, F Yu, XF Wang 2013 IEEE Symposium on Security and Privacy, 112-126, 2013 | 148 | 2013 |
Resident Evil: Understanding Residential IP Proxy as a Dark Service X Mi, Y Liu, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun Resident Evil: Understanding Residential IP Proxy as a Dark Service, 0, 2019 | 99 | 2019 |
Understanding the dark side of domain parking S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang 23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014 | 81 | 2014 |
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks S Alrwais, X Liao, X Mi, P Wang, X Wang, F Qian, R Beyah, D McCoy 2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017 | 63 | 2017 |
Dissecting ghost clicks: Ad fraud via misdirected human clicks SA Alrwais, A Gerber, CW Dunn, O Spatscheck, M Gupta, E Osterweil Proceedings of the 28th Annual Computer Security Applications Conference, 21-30, 2012 | 60 | 2012 |
Hunting the red fox online: Understanding and detection of mass redirect-script injections Z Li, S Alrwais, XF Wang, E Alowaisheq 2014 IEEE Symposium on Security and Privacy, 3-18, 2014 | 55 | 2014 |
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs E Alowaisheq, P Wang, S Alrwais, X Liao, XF Wang, T Alowaisheq, X Mi, ... NDSS Symposium, 2019 | 52 | 2019 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 50 | 2016 |
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting A Noroozian, J Koenders, E van Veldhuizen, CH Ganan, S Alrwais, ... 28th {USENIX} Security Symposium ({USENIX} Security 19), 1341-1356, 2019 | 36 | 2019 |
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 24 | 2016 |
Catching predators at watering holes: finding and understanding strategically compromised websites S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 23 | 2016 |
Access control using threshold cryptography for ubiquitous computing environments J Al-Muhtadi, R Hill, S Al-Rwais Journal of King Saud University-Computer and Information Sciences 23 (2), 71-78, 2011 | 16 | 2011 |
A context-aware access control model for pervasive environments S Al-Rwais, J Al-Muhtadi IETE Technical Review 27 (5), 371-379, 2010 | 14 | 2010 |
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, XF Wang, S Hao, Y Jia, ... 4th IEEE European Symposium on Security and Privacy (EuroS&P 2019), 2019 | 13 | 2019 |
Cloud repository as a malicious service: challenge, identification and implication X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah Cybersecurity 1 (1), 14, 2018 | 9 | 2018 |
Detecting malicious websites A Oprea, S Alrwais, KD Bowers, TS Leetham, Z Li, RL Rivest US Patent 9,621,576, 2017 | 8 | 2017 |
Behind the scenes of IaaSimplementations S Alrwais Indiana, 0 | | |