• Publications
  • Influence
Fine-grained private matching for proximity-based mobile social networking
TLDR
This paper designs a suite of novel fine-grained private matching protocols for proximity-based mobile social networking that allow finer differentiation between PMSN users and can support a wide range of matching metrics at different privacy levels. Expand
Malware propagation in online social networks: nature, dynamics, and defense implications
TLDR
This comprehensive study uses extensive trace-driven simulation to study the impact of initial infection, user click probability, social structure, and activity patterns on malware propagation in online social networks. Expand
Chrome Extensions: Threat Analysis and Countermeasures
TLDR
This study demonstrates that malicious Chrome extensions pose serious threats, including both information dispersion and harvesting, to browsers and proposes a set of countermeasures that enforce the policies of microprivilege management and differentiating DOM elements. Expand
Containment of misinformation spread in online social networks
TLDR
Empirical results indicate that the β1T -- Node Protectors methods are among the best ones for hinting out those important nodes in comparison with other available methods for limit viral propagation of misinformation in OSNs. Expand
Discriminant malware distance learning on structuralinformation for automated malware classification
TLDR
This work explores techniques that can automatically classify malware variants into their corresponding families and adopts an ensemble of classifiers for automated malware classification. Expand
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking
TLDR
This paper designs novel fine-grained private matching protocols for proximity-based mobile social networking that allow finer differentiation between PMSN users and can support a wide range of matching metrics at different privacy levels. Expand
VirusMeter: Preventing Your Cellphone from Spies
TLDR
VirusMeter is proposed, a novel and general malware detection method, to detect anomalous behaviors on mobile devices and can effectively detect these malware activities with less than 1.5% additional power consumption in real time. Expand
RINSE: the real-time immersive network simulation environment for network security exercises
TLDR
The architecture and function of RINSE is described and how techniques like multiresolution traffic modeling and new routing simulation methods are used to address the scalability challenges of this application are outlined. Expand
Simulation of large scale networks using SSF
TLDR
This paper considers the issue of faster than real-time simulation of very large communication networks, and how this is accomplished using the implementation (in C++) of the scalable simulation framework (SSF). Expand
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)
TLDR
A detailed analytical model is presented that characterizes the propagation dynamics of Bluetooth worms and allows to predict spreading curves of Bluetooth worm propagation in large areas without the high computational cost of discrete-event simulation. Expand
...
1
2
3
4
5
...