BibTeX records: Yazan Boshmaf

download as .bib file

@article{DBLP:journals/corr/abs-2405-20455,
  author       = {Mohannad Alhanahnah and
                  Yazan Boshmaf and
                  Benoit Baudry},
  title        = {DepsRAG: Towards Managing Software Dependencies using Large Language
                  Models},
  journal      = {CoRR},
  volume       = {abs/2405.20455},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.20455},
  doi          = {10.48550/ARXIV.2405.20455},
  eprinttype    = {arXiv},
  eprint       = {2405.20455},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-20455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-11259,
  author       = {Mohannad Alhanahnah and
                  Yazan Boshmaf and
                  Ashish Gehani},
  title        = {SoK: Software Debloating Landscape and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2407.11259},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.11259},
  doi          = {10.48550/ARXIV.2407.11259},
  eprinttype    = {arXiv},
  eprint       = {2407.11259},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-11259.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BoshmafPKLJ23,
  author       = {Yazan Boshmaf and
                  Isuranga Perera and
                  Udesh Kumarasinghe and
                  Sajitha Liyanage and
                  Husam Al Jawaheri},
  title        = {Dizzy: Large-Scale Crawling and Analysis of Onion Services},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {9:1--9:11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600167},
  doi          = {10.1145/3600160.3600167},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BoshmafPKLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SabahNBC22,
  author       = {Mashael Al Sabah and
                  Mohamed Nabeel and
                  Yazan Boshmaf and
                  Euijin Choo},
  title        = {Content-Agnostic Detection of Phishing Domains using Certificate Transparency
                  and Passive {DNS}},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {446--459},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545958},
  doi          = {10.1145/3545948.3545958},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SabahNBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-07202,
  author       = {Isuranga Perera and
                  Yazan Boshmaf},
  title        = {Dizzy: Large-Scale Crawling and Analysis of Onion Services},
  journal      = {CoRR},
  volume       = {abs/2209.07202},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.07202},
  doi          = {10.48550/ARXIV.2209.07202},
  eprinttype    = {arXiv},
  eprint       = {2209.07202},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-07202.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JawaheriSBE20,
  author       = {Husam Al Jawaheri and
                  Mashael Al Sabah and
                  Yazan Boshmaf and
                  Aiman Erbad},
  title        = {Deanonymizing Tor hidden service users through Bitcoin transactions
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101684},
  doi          = {10.1016/J.COSE.2019.101684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JawaheriSBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoshmafEJWS20,
  author       = {Yazan Boshmaf and
                  Charitha Elvitigala and
                  Husam Al Jawaheri and
                  Primal Wijesekera and
                  Mashael Al Sabah},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Investigating {MMM} Ponzi Scheme on Bitcoin},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {519--530},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384719},
  doi          = {10.1145/3320269.3384719},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoshmafEJWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BoshmafJS19,
  author       = {Yazan Boshmaf and
                  Husam Al Jawaheri and
                  Mashael Al Sabah},
  editor       = {Gurpreet Dhillon and
                  Fredrik Karlsson and
                  Karin Hedstr{\"{o}}m and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {BlockTag: Design and Applications of a Tagging System for Blockchain
                  Analysis},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
                  International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
                  2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {562},
  pages        = {299--313},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22312-0\_21},
  doi          = {10.1007/978-3-030-22312-0\_21},
  timestamp    = {Thu, 23 Apr 2020 08:52:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BoshmafJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-04002,
  author       = {Yury Zhauniarovich and
                  Yazan Boshmaf and
                  Husam Al Jawaheri and
                  Mashael Al Sabah},
  title        = {Characterizing Bitcoin donations to open source software on GitHub},
  journal      = {CoRR},
  volume       = {abs/1907.04002},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.04002},
  eprinttype    = {arXiv},
  eprint       = {1907.04002},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-04002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-12244,
  author       = {Yazan Boshmaf and
                  Charitha Elvitigala and
                  Husam Al Jawaheri and
                  Primal Wijesekera and
                  Mashael Al Sabah},
  title        = {Investigating {MMM} Ponzi scheme on Bitcoin},
  journal      = {CoRR},
  volume       = {abs/1910.12244},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.12244},
  eprinttype    = {arXiv},
  eprint       = {1910.12244},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-12244.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MuslukhovBB18,
  author       = {Ildar Muslukhov and
                  Yazan Boshmaf and
                  Konstantin Beznosov},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Source Attribution of Cryptographic {API} Misuse in Android Applications},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {133--146},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196538},
  doi          = {10.1145/3196494.3196538},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MuslukhovBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07501,
  author       = {Husam Al Jawaheri and
                  Mashael Al Sabah and
                  Yazan Boshmaf and
                  Aiman Erbad},
  title        = {When {A} Small Leak Sinks {A} Great Ship: Deanonymizing Tor Hidden
                  Service Users Through Bitcoin Transactions Analysis},
  journal      = {CoRR},
  volume       = {abs/1801.07501},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.07501},
  eprinttype    = {arXiv},
  eprint       = {1801.07501},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-07501.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06044,
  author       = {Yazan Boshmaf and
                  Husam Al Jawaheri and
                  Mashael Al Sabah},
  title        = {BlockTag: Design and applications of a tagging system for blockchain
                  analysis},
  journal      = {CoRR},
  volume       = {abs/1809.06044},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.06044},
  eprinttype    = {arXiv},
  eprint       = {1809.06044},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-06044.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoshmafLSLLRBH16,
  author       = {Yazan Boshmaf and
                  Dionysios Logothetis and
                  Georgos Siganos and
                  Jorge Ler{\'{\i}}a and
                  Jos{\'{e}} Lorenzo and
                  Matei Ripeanu and
                  Konstantin Beznosov and
                  Hassan Halawa},
  title        = {{\'{I}}ntegro: Leveraging victim prediction for robust fake account
                  detection in large scale OSNs},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {142--168},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.005},
  doi          = {10.1016/J.COSE.2016.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoshmafLSLLRBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MuslukhovSWBB16,
  author       = {Ildar Muslukhov and
                  San{-}Tsai Sun and
                  Primal Wijesekera and
                  Yazan Boshmaf and
                  Konstantin Beznosov},
  title        = {Decoupling data-at-rest encryption and smartphone locking with wearable
                  devices},
  journal      = {Pervasive Mob. Comput.},
  volume       = {32},
  pages        = {26--34},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2016.06.016},
  doi          = {10.1016/J.PMCJ.2016.06.016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/MuslukhovSWBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egpgv/BudiuIMPBABLA16,
  author       = {Mihai Budiu and
                  Rebecca Isaacs and
                  Derek Murray and
                  Gordon D. Plotkin and
                  Paul Barham and
                  Samer Al{-}Kiswany and
                  Yazan Boshmaf and
                  Qingzhou Luo and
                  Alexandr Andoni},
  editor       = {Enrico Gobbetti and
                  Wes Bethel},
  title        = {Interacting with Large Distributed Datasets Using Sketch},
  booktitle    = {16th Eurographics Symposium on Parallel Graphics and Visualization,
                  EGPGV@EuroVis 2016, Groningen, The Netherlands, June 6-10, 2016},
  pages        = {31--43},
  publisher    = {Eurographics Association},
  year         = {2016},
  url          = {https://doi.org/10.2312/pgv.20161180},
  doi          = {10.2312/PGV.20161180},
  timestamp    = {Wed, 01 Jul 2020 12:39:22 +0200},
  biburl       = {https://dblp.org/rec/conf/egpgv/BudiuIMPBABLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HalawaBBCRS16,
  author       = {Hassan Halawa and
                  Konstantin Beznosov and
                  Yazan Boshmaf and
                  Baris Coskun and
                  Matei Ripeanu and
                  Elizeu Santos{-}Neto},
  editor       = {Carrie Gates and
                  Rainer B{\"{o}}hme and
                  Mohammad Mannan and
                  Serge Egelman},
  title        = {Harvesting the low-hanging fruits: defending against automated large-scale
                  cyber-intrusions by focusing on the vulnerable population},
  booktitle    = {Proceedings of the 2016 New Security Paradigms Workshop, {NSPW} 2016,
                  Granby, Colorado, USA, September 26-29, 2016},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011883.3011885},
  doi          = {10.1145/3011883.3011885},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/HalawaBBCRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AupetitZVDB16,
  author       = {Micha{\"{e}}l Aupetit and
                  Yury Zhauniarovich and
                  Giorgos Vasiliadis and
                  Marc Dacier and
                  Yazan Boshmaf},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Visualization of actionable knowledge to mitigate DRDoS attacks},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739577},
  doi          = {10.1109/VIZSEC.2016.7739577},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AupetitZVDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoshmafRBS15,
  author       = {Yazan Boshmaf and
                  Matei Ripeanu and
                  Konstantin Beznosov and
                  Elizeu Santos{-}Neto},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Thwarting Fake {OSN} Accounts by Predicting their Victims},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {81--89},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808772},
  doi          = {10.1145/2808769.2808772},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoshmafRBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BoshmafLSLLRB15,
  author       = {Yazan Boshmaf and
                  Dionysios Logothetis and
                  Georgos Siganos and
                  Jorge Ler{\'{\i}}a and
                  Jos{\'{e}} Lorenzo and
                  Matei Ripeanu and
                  Konstantin Beznosov},
  title        = {Integro: Leveraging Victim Prediction for Robust Fake Account Detection
                  in OSNs},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/integro-leveraging-victim-prediction-robust-fake-account-detection-osns},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BoshmafLSLLRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/RashtianBJB14,
  author       = {Hootan Rashtian and
                  Yazan Boshmaf and
                  Pooya Jaferian and
                  Konstantin Beznosov},
  editor       = {Lorrie Faith Cranor and
                  Lujo Bauer and
                  Robert Biddle},
  title        = {To Befriend Or Not? {A} Model of Friend Request Acceptance on Facebook},
  booktitle    = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo
                  Park, CA, USA, July 9-11, 2014},
  pages        = {285--300},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/soups2014/proceedings/presentation/rashtian},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/RashtianBJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BoshmafMBR13,
  author       = {Yazan Boshmaf and
                  Ildar Muslukhov and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  title        = {Design and analysis of a social botnet},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {2},
  pages        = {556--578},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.06.006},
  doi          = {10.1016/J.COMNET.2012.06.006},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BoshmafMBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/SchuhmannHRB13,
  author       = {Stephan Schuhmann and
                  Klaus Herrmann and
                  Kurt Rothermel and
                  Yazan Boshmaf},
  title        = {Adaptive Composition of Distributed Pervasive Applications in Heterogeneous
                  Environments},
  journal      = {{ACM} Trans. Auton. Adapt. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {10:1--10:21},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491465.2491469},
  doi          = {10.1145/2491465.2491469},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taas/SchuhmannHRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BoshmafBR13,
  author       = {Yazan Boshmaf and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  editor       = {Jon G. Rokne and
                  Christos Faloutsos},
  title        = {Graph-based Sybil detection in social and information systems},
  booktitle    = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13,
                  Niagara, ON, Canada - August 25 - 29, 2013},
  pages        = {466--473},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492517.2492568},
  doi          = {10.1145/2492517.2492568},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/BoshmafBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/MuslukhovBKLB13,
  author       = {Ildar Muslukhov and
                  Yazan Boshmaf and
                  Cynthia Kuo and
                  Jonathan Lester and
                  Konstantin Beznosov},
  editor       = {Michael Rohs and
                  Albrecht Schmidt and
                  Daniel Ashbrook and
                  Enrico Rukzio},
  title        = {Know your enemy: the risk of unauthorized access in smartphones by
                  insiders},
  booktitle    = {15th International Conference on Human-Computer Interaction with Mobile
                  Devices and Services, MobileHCI '13, Munich, Germany, August 27 -
                  30, 2013},
  pages        = {271--280},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2493190.2493223},
  doi          = {10.1145/2493190.2493223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mhci/MuslukhovBKLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/MuslukhovBKLB12,
  author       = {Ildar Muslukhov and
                  Yazan Boshmaf and
                  Cynthia Kuo and
                  Jonathan Lester and
                  Konstantin Beznosov},
  editor       = {Anastasios Kementsietsidis and
                  Marcos Antonio Vaz Salles},
  title        = {Understanding Users' Requirements for Data Protection in Smartphones},
  booktitle    = {Workshops Proceedings of the {IEEE} 28th International Conference
                  on Data Engineering, {ICDE} 2012, Arlington, VA, USA, April 1-5, 2012},
  pages        = {228--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDEW.2012.83},
  doi          = {10.1109/ICDEW.2012.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/MuslukhovBKLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/BoshmafMBR12,
  author       = {Yazan Boshmaf and
                  Ildar Muslukhov and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  editor       = {Engin Kirda},
  title        = {Key Challenges in Defending Against Malicious Socialbots},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/boshmaf},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/BoshmafMBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BoshmafMBR11,
  author       = {Yazan Boshmaf and
                  Ildar Muslukhov and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {The socialbot network: when bots socialize for fame and money},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076746},
  doi          = {10.1145/2076732.2076746},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BoshmafMBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SunBHB10,
  author       = {San{-}Tsai Sun and
                  Yazan Boshmaf and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {A billion keys, but few locks: the crisis of web single sign-on},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900556},
  doi          = {10.1145/1900546.1900556},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SunBHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/WillhalmPBPZS09,
  author       = {Thomas Willhalm and
                  Nicolae Popovici and
                  Yazan Boshmaf and
                  Hasso Plattner and
                  Alexander Zeier and
                  Jan Schaffner},
  title        = {SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing
                  Units},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {2},
  number       = {1},
  pages        = {385--394},
  year         = {2009},
  url          = {http://www.vldb.org/pvldb/vol2/vldb09-327.pdf},
  doi          = {10.14778/1687627.1687671},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/WillhalmPBPZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}