Hisham Alasmary
Hisham Alasmary
Assistant Professor, King Khalid University
Verified email at kku.edu.sa
Title
Cited by
Cited by
Year
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
372019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
242019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
242018
RouteChain: towards blockchain-based secure and efficient BGP routing
M Saad, A Anwar, A Ahmad, H Alasmary, M Yuksel, A Mohaisen
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
232019
Examining adversarial learning against graph-based iot malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
arXiv preprint arXiv:1902.04416, 2019
72019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
52020
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
52019
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
52019
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection
A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen
International Conference on Information and Communications Security, 443-461, 2020
32020
Subgraph-based adversarial examples against graph-based iot malware detection systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ...
International Conference on Computational Data and Social Networks, 268-281, 2019
32019
Breaking graph-based IoT malware detection systems using adversarial examples: Poster
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
32019
Qoi: Assessing participation in threat information sharing
J Park, H Alasmary, O Al-Ibrahim, C Kamhoua, K Kwiat, L Njilla, ...
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
32018
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks, 107699, 2020
12020
Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross‐Layer Profiling
H Alasmary, A Anwar, LL Njilla, CA Kamhoua, A Mohaisen
Modeling and Design of Secure Internet of Things, 249-272, 2020
12020
SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
IEEE Internet of Things Journal, 2021
2021
Domain name system security and privacy: A contemporary survey (vol 185, 107699, 2020)
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
COMPUTER NETWORKS 188, 2021
2021
Corrigendum to “Domain name system security and privacy: A contemporary survey” Computer Networks Volume 185 (2020) 107699
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 188, 107814, 2021
2021
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
A Anwar, J Choi, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ...
arXiv preprint arXiv:2103.14217, 2021
2021
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
arXiv preprint arXiv:2005.07145, 2020
2020
Measuring the Cost of Software Vulnerabilities
A Anwar, A Khormali, J Choi, H Alasmary, S Choi, S Salem, DH Nyang, ...
EAI Endorsed Transactions on Security and Safety 7 (23), e1, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20