关注
Ali Zand
Ali Zand
Google
在 cs.ucsb.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
289*2017
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1612020
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS 17, 10-14722, 2017
1492017
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sedighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
742017
Targeted attacks against industrial control systems: Is the power industry prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 13-22, 2014
682014
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
652011
Extracting Probable Command and Control Signatures for Detecting Botnets
A Zand, G Vigna, X Yan, C Kruegel
Symposium On Applied Computing (SAC), 2014
482014
Nexat: A history-based approach to predict attacker actions
C Cipriano, A Zand, A Houmansadr, C Kruegel, G Vigna
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
352011
Who is targeted by email-based phishing and malware? measuring factors that differentiate risk
C Simoiu, A Zand, K Thomas, E Bursztein
Proceedings of the ACM Internet Measurement Conference, 567-576, 2020
342020
Rippler: Delay injection for service dependency detection
A Zand, G Vigna, R Kemmerer, C Kruegel
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2157-2165, 2014
342014
Demystifying DDoS as a service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
172017
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al. 2017. Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proc. CCS 10 (3133956.3134067), 0
16
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
122016
Know your achilles' heel: Automatic detection of network critical services
A Zand, A Houmansadr, G Vigna, R Kemmerer, C Kruegel
Proceedings of the 31st Annual Computer Security Applications Conference, 41-50, 2015
112015
& Margolis, D.(2017, October). Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 0
6
Contextualizing Network Security
A Zand
University of California, Santa Barbara, 2015
12015
Avoiding Generative Model Writer's Block With Embedding Nudging
A Zand, M Nasr
arXiv preprint arXiv:2408.15450, 2024
2024
A Voting-Based Architecture for Survivable Hierarchical IDSes
A Zand, B Sadeghian
2009
系统目前无法执行此操作,请稍后再试。
文章 1–18