Follow
David Mohaisen
Title
Cited by
Cited by
Year
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
236*2020
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
ACM IMC, 2010
2292010
AMAL: High-fidelity, behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Mohaisen
Computer & Security, 2015
2212015
XMSS: eXtended Merkle Signature Scheme
A Huelsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen
IETF -- RFC 8391, 2018
167*2018
Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
IEEE INFOCOM, 2011
1522011
Detecting and classifying android malware using static analysis along with creator information
H Kang, J Jang, A Mohaisen, HK Kim
DSN, 2015
1492015
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
ACM CCS, 2010
1362010
Delving into internet DDoS attacks by botnets: characterization and analysis
A Wang, A Mohaisen, W Chang, S Chen
IEEE/ACM Transactions on Networking (TON), 2018
1242018
Av-meter: An evaluation of antivirus scans and labels
A Mohaisen, O Alrawi
DIMVA, 112-131, 2014
1152014
A survey on deep packet inspection for intrusion detection systems
T AbuHmed, A Mohaisen, DH Nyang
arXiv preprint arXiv:0803.0037, 2008
1082008
Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic
M Thomas, A Mohaisen
WWW, 2014
1012014
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
S Chen, K Ren, S Piao, C Wang, Q Wang, J Weng, L Su, A Mohaisen
IEEE ICDCS, 2017
982017
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
902019
Unveiling zeus: automated classification of malware samples
A Mohaisen, O Alrawi
WWW, 2013
892013
Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), 2019
86*2019
Protecting access privacy of cached contents in information centric networks
A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim
ACM ASIACCS, 2013
712013
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
T Zhu, A Mohaisen, Y Ping, D Towsley
IEEE INFOCOM, 2012
682012
Trustworthy distributed computing on social networks
A Mohaisen, H Tran, A Chandra, Y Kim
IEEE TSC, 2014
64*2014
Android Malware Detection using Complex-Flows
F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek
IEEE TMC, 2018
632018
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
622019
The system can't perform the operation now. Try again later.
Articles 1–20