PhishEye: Live Monitoring of Sandboxed Phishing Kits X Han, N Kheir, D Balzarotti Computer and Communication Security (CCS), 2016 | 155 | 2016 |
Deception techniques in computer security: A research perspective X Han, N Kheir, D Balzarotti ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018 | 123 | 2018 |
Evaluation of Deception-based Web Attacks Detection X Han, N Kheir, D Balzarotti Workshop on Moving Target Defense (MTD), 65-73, 2017 | 52 | 2017 |
The role of cloud services in malicious software: Trends and insights X Han, N Kheir, D Balzarotti Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 23 | 2015 |
Behavioral fine-grained detection and classification of P2P bots N Kheir, X Han, C Wolley Journal of Computer Virology and Hacking Techniques 11, 217-233, 2015 | 13 | 2015 |
Peerviewer: Behavioral tracking and classification of P2P malware N Kheir, X Han Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 8 | 2013 |
Interpretable and adversarially-resistant behavioral malware signatures X Han, B Olivier Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1668-1677, 2020 | 7 | 2020 |