Personal profile

External positions

Computing

Informatics and Decision Systems Engineering

School of (CIDSE)

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 5 Similar Profiles
Malware Engineering & Materials Science
Access control Engineering & Materials Science
Students Engineering & Materials Science
Application programs Engineering & Materials Science
Communication Engineering & Materials Science
Ecosystems Engineering & Materials Science
Industry Engineering & Materials Science
Servers Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2017

  • 146 Citations
  • 5 h-Index
  • 21 Conference contribution
  • 1 Chapter
  • 1 Article

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G. J. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: ResearchConference contribution

Malware
Static analysis
Pipelines
Neural networks
Graphics processing unit

Panel: Trustworthy data science

Doupé, A. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 217 1 p.

Research output: ResearchConference contribution

1 Citations

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Tu, H., Doupé, A., Zhao, Z. & Ahn, G. J. Jan 4 2017 Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

Research output: ResearchConference contribution

Authentication
Industry
2 Citations

Towards automated threat intelligence fusion

Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupé, A., Ahn, G. J. & Black, P. Jan 6 2017 Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731

Research output: ResearchConference contribution

intelligence
threat
Fusion reactions
event
Malware
2 Citations

Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

Liao, K., Zhao, Z., Doupe, A. & Ahn, G. J. Jun 8 2016 Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, Vol. 2016-June, p. 1-13 13 p. 7487938

Research output: ResearchConference contribution

Cybercrime
Payment
Fog
Ecosystems
Topology

Projects 2015 2019