Farnaz Moradi

Learn More
Community detection algorithms are widely used to study the structural properties of real-world networks. In this paper, we experimentally evaluate the qualitative performance of several community detection algorithms using large-scale email networks. The email networks were generated from real email traffic and contain both legitimate email (ham) and(More)
Identifying unsolicited email based on their network-level behavior rather than their content have received huge interest. In this study, we investigate the social network properties of large-scale <i>email networks</i> generated from real email traffic to reveal the properties that are indicative of spam as opposed to the expected legitimate behavior. By(More)
In this paper, we study the problem of identifying misbehaving network communications using community detection algorithms. Recently, it was shown that identifying the communications that do not respect community boundaries is a promising approach for network intrusion detection. However, it was also shown that traditional community detection algorithms are(More)
—One of the widely studied structural properties of social and information networks is their community structure, and a vast variety of community detection algorithms have been proposed in the literature. Expansion of a seed node into a community is one of the most successful methods for local community detection, especially when the global structure of the(More)
E-mail is probably the most popular application on the In-ternet, with everyday business and personal communications dependent on it. Spam or unsolicited e-mail has been estimated to cost businesses significant amounts of money. However , our understanding of the network-level behavior of legitimate e-mail traffic and how it differs from spam traffic is(More)
—Passive monitoring of network performance parameters is experiencing a revival due to widespread adoption of virtualization and software-based implementation of network functions. Timestamping is one of the most challenging operations needed for passively monitoring network traffic performance parameters such as latency and jitter. We develop a setup(More)
MELANOMA BRIDGE 2015 KEYNOTE SPEAKER PRESENTATIONS Molecular and immuno-advances K1 Immunologic and metabolic consequences of PI3K/AKT/mTOR activation in melanoma Vashisht G. Y. Nanda, Weiyi Peng, Patrick Hwu, Michael A. Davies K2 Non-mutational adaptive changes in melanoma cells exposed to BRAF and MEK inhibitors help the establishment of drug resistance(More)
  • 1