• Publications
  • Influence
On the analysis of the Zeus botnet crimeware toolkit
In this paper, we present our reverse engineering results for the Zeus crimeware toolkit which is one of the recent and powerful crimeware tools that emerged in the Internet underground community toExpand
  • 218
  • 20
  • PDF
A Survey and a Layered Taxonomy of Software-Defined Networking
Software-defined networking (SDN) has recently gained unprecedented attention from industry and research communities, and it seems unlikely that this will be attenuated in the near future. The ideasExpand
  • 268
  • 15
  • PDF
Mining writeprints from anonymous e-mails for forensic investigation
Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities. E-mail is the most commonly used medium for such activities. Extracting knowledge and informationExpand
  • 156
  • 13
  • PDF
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among all nodes and prolongExpand
  • 143
  • 10
  • PDF
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance overhead of the IDS,Expand
  • 99
  • 10
  • PDF
Communication security for smart grid distribution networks
The operation and control of the next generation electrical grids will depend on a complex network of computers, software, and communication technologies. Being compromised by a malicious adversaryExpand
  • 144
  • 9
  • PDF
A unified data mining solution for authorship analysis in anonymous textual communications
The cyber world provides an anonymous environment for criminals to conduct malicious activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often, these activities involveExpand
  • 99
  • 9
  • PDF
MalDozer: Automatic framework for android malware detection using deep learning
Abstract Android OS experiences a blazing popularity since the last few years. This predominant platform has established itself not only in the mobile world but also in the Internet of Things (IoT)Expand
  • 74
  • 9
  • PDF
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the appearance of this research topic in 1997,Expand
  • 76
  • 7
  • PDF
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The latter is anExpand
  • 51
  • 6