


Остановите войну!
for scientists:


default search action
Gail-Joon Ahn
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j65]Carlos E. Rubio-Medrano
, Pradeep Kumar Duraisamy Soundrapandian, Matthew Hill, Luis Claramunt, Jaejong Baek, Geetha S, Gail-Joon Ahn:
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android. Inf. Syst. Frontiers 25(2): 529-548 (2023) - [c177]Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. SACMAT 2023: 79-90 - 2022
- [j64]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - [c176]Haehyun Cho
, Jinbum Park, Adam Oest, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
ViK: practical mitigation of temporal memory safety violations through object ID inspection. ASPLOS 2022: 271-284 - [c175]Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. CCS 2022: 3165-3179 - [c174]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - 2021
- [j63]Jing Chen
, Chiheng Wang
, Kun He
, Ziming Zhao, Min Chen
, Ruiying Du, Gail-Joon Ahn
:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [c173]Doowon Kim
, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. AsiaCCS 2021: 407-420 - [c172]Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. EuroS&P 2021: 704-706 - [c171]Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. EuroS&P 2021: 713-715 - [c170]Pradeep Kumar Duraisamy Soundrapandian, Tiffany Bao, Jaejong Baek, Yan Shoshitaishvili, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn:
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts. HICSS 2021: 1-10 - [c169]Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. NDSS 2021 - [c168]Carlos E. Rubio-Medrano, Matthew Hill, Luis M. Claramunt, Jaejong Baek, Gail-Joon Ahn:
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android. SKM 2021: 23-36 - [c167]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. IEEE Symposium on Security and Privacy 2021: 1109-1124 - [c166]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i5]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun
, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. CoRR abs/2103.12843 (2021) - 2020
- [c165]Efrén López-Morales, Carlos E. Rubio-Medrano
, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn
:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c164]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. eCrime 2020: 1-10 - [c163]Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
:
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture. MobiSys 2020: 107-120 - [c162]Carlos E. Rubio-Medrano
, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn
:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. SACMAT 2020: 131-144 - [c161]Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
:
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems. TPS-ISA 2020: 319-322 - [c160]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c159]Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020 - [e20]Qi Alfred Chen, Ziming Zhao, Gail-Joon Ahn:
AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020. ACM 2020, ISBN 978-1-4503-7113-1 [contents]
2010 – 2019
- 2019
- [j62]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn
, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [j61]Gail-Joon Ahn
, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c158]Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. CCS 2019: 1955-1970 - [c157]Ankur Chowdhary, Dijiang Huang
, Gail-Joon Ahn
, Myong H. Kang, Anya Kim, Alexander Velazquez
:
SDNSOC: Object Oriented SDN Framework. SDN-NFV@CODASPY 2019: 7-12 - [c156]Zhibo Sun
, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn
:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c155]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c154]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - [c153]Carlos E. Rubio-Medrano
, Shaishavkumar Jogani, Maria Leitner
, Ziming Zhao, Gail-Joon Ahn
:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - [c152]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn
, Brad Wardman, Kevin Tyers:
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. IEEE Symposium on Security and Privacy 2019: 1344-1361 - [c151]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. USENIX Security Symposium 2019: 1327-1340 - [e19]Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9 [contents] - [e18]Ziming Zhao, Qi Alfred Chen, Gail-Joon Ahn:
Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6180-4 [contents] - [e17]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - 2018
- [j60]Haehyun Cho
, Jeong Hyun Yi
, Gail-Joon Ahn
:
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. IEEE Access 6: 71229-71240 (2018) - [j59]Hyunki Kim, Taejoo Cho, Gail-Joon Ahn
, Jeong Hyun Yi:
Risk assessment of mobile applications based on machine learned malware dataset. Multim. Tools Appl. 77(4): 5027-5042 (2018) - [j58]Xinxin Zhao, Lingjun Li, Guoliang Xue
, Gail-Joon Ahn
:
Efficient Anonymous Message Submission. IEEE Trans. Dependable Secur. Comput. 15(2): 217-230 (2018) - [j57]Jing Chen
, Chiheng Wang
, Ziming Zhao, Kai Chen
, Ruiying Du, Gail-Joon Ahn
:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [c150]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - [c149]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c148]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn
, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c147]Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn
:
CacheLight: Defeating the CacheKit Attack. ASHES@CCS 2018: 65-74 - [c146]Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn
:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. CCS 2018: 664-676 - [c145]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
:
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS. CHASE 2018: 94-99 - [c144]Vaibhav Hemant Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn
:
Challenges and Preparedness of SDN-based Firewalls. SDN-NFV@CODASPY 2018: 33-38 - [c143]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - [c142]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn
, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - [c141]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Challenges, Opportunities and a Framework for Web Environment Forensics. IFIP Int. Conf. Digital Forensics 2018: 11-33 - [c140]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c139]Vu Coughlin, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
:
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems. SmartGridComm 2018: 1-6 - [e16]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e15]Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [e14]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [r2]Gail-Joon Ahn:
Discretionary Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j56]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Toward Standardization of Authenticated Caller ID Transmission. IEEE Commun. Stand. Mag. 1(3): 30-36 (2017) - [j55]Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
E-mail Header Injection Vulnerabilities. it Inf. Technol. 59(2): 67 (2017) - [c138]Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupé, Ziming Zhao, Marthony Taguinod, Gail-Joon Ahn:
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. AAMAS 2017: 178-186 - [c137]Carlos E. Rubio-Medrano
, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c136]Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. CNS 2017: 1-9 - [c135]Niall McLaughlin
, Jesús Martínez del Rincón
, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c134]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - [c133]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c132]Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukwha Kyung, Dijiang Huang
, Gail-Joon Ahn
:
Science DMZ: SDN based secured cloud testbed. NFV-SDN 2017: 1-2 - [c131]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn
, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - [c130]Nishant Vishwamitra, Yifang Li
, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn
:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - [c129]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai
, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn
:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - [e13]Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita:
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017. ACM 2017, ISBN 978-1-4503-4523-1 [contents] - [e12]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j54]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
dbling: Identifying extensions installed on encrypted web thin clients. Digit. Investig. 18 Supplement: S55-S65 (2016) - [j53]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn
, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j52]Yiming Jing, Gail-Joon Ahn
, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [c128]Satya Gautam Vadlamudi, Sailik Sengupta, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Subbarao Kambhampati:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). AAMAS 2016: 1377-1378 - [c127]Yiming Jing, Gail-Joon Ahn
, Adam Doupé, Jeong Hyun Yi
:
Checking Intent-based Communication in Android with Intent Space Analysis. AsiaCCS 2016: 735-746 - [c126]Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
HoneyMix: Toward SDN-based Intelligent Honeynet. SDN-NFV@CODASPY 2016: 1-6 - [c125]Carlos E. Rubio-Medrano
, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - [c124]Ajay Modi, Zhibo Sun
, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
, Paul Black:
Towards Automated Threat Intelligence Fusion. CIC 2016: 408-416 - [c123]Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13 - [c122]Dae-il Jang, Gail-Joon Ahn
, Hyunuk Hwang, Kibom Kim:
Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper). IRI 2016: 609-614 - [c121]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation. Kaleidoscope 2016: 1-8 - [c120]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c119]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. IEEE Symposium on Security and Privacy 2016: 320-338 - [e11]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - [i4]Satya Gautam Vadlamudi, Sailik Sengupta, Subbarao Kambhampati, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. CoRR abs/1602.07024 (2016) - 2015
- [j51]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn
:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j50]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Trans. Collab. Comput. 1(6): e3 (2015) - [j49]Yiming Jing, Gail-Joon Ahn
, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j48]Ziming Zhao, Gail-Joon Ahn
, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - [c118]Jon C. Haass, Gail-Joon Ahn
, Frank Grimmelmann:
ACTRA: A Case Study for Threat Information Sharing. WISCS@CCS 2015: 23-26 - [c117]Khaled Riad
, Yan Zhu
, Hongxin Hu, Gail-Joon Ahn
:
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. CIC 2015: 28-35 - [c116]Napoleon Paxton, Dae-il Jang, Stephen Russell, Gail-Joon Ahn
, Ira S. Moskowitz, Paul Hyden:
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. HICSS 2015: 5244-5252 - [c115]Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
Toward a Moving Target Defense for Web Applications. IRI 2015: 510-517 - [c114]Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn
, Jun Bi, Younghee Park:
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. NFV-SDN 2015: 107-114 - [c113]Carlos E. Rubio-Medrano
, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - [e10]Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3 [contents] - 2014
- [j47]Yan Zhu
, Di Ma
, Changjun Hu, Gail-Joon Ahn
, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - [c112]Yiming Jing, Ziming Zhao, Gail-Joon Ahn
, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c111]Gail-Joon Ahn
, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - [c110]Yiming Jing, Gail-Joon Ahn
, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c109]Napoleon Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-Joon Ahn
, Stephen Russell:
Discovering and analyzing deviant communities: Methods and experiments. CollaborateCom 2014: 163-170 - [c108]Carlos E. Rubio-Medrano, Gail-Joon Ahn
, Karsten Sohr
:
Achieving security assurance with assertion-based application construction. CollaborateCom 2014: 503-510 - [c107]Wonkyu Han, Hongxin Hu, Gail-Joon Ahn
:
LPM: Layered Policy Management for Software-Defined Networks. DBSec 2014: 356-363 - [c106]Clinton D'Souza, Gail-Joon Ahn
, Marthony Taguinod:
Policy-driven security management for fog computing: Preliminary framework and a case study. IRI 2014: 16-23 - [c105]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c104]Hongxin Hu, Gail-Joon Ahn
, Ziming Zhao, Dejun Yang
:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c103]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn
, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - [e9]Gail-Joon Ahn, Moti Yung, Ninghui Li:
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. ACM 2014, ISBN 978-1-4503-2957-6 [contents] - [e8]