If you made any changes in Pure these will be visible here soon.

Personal profile

Education/Academic qualification

PHD, George Mason University

… → 2000

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 9 Similar Profiles
Access control Engineering & Materials Science
Cloud computing Engineering & Materials Science
Specifications Engineering & Materials Science
Internet Engineering & Materials Science
Industry Engineering & Materials Science
Cryptography Engineering & Materials Science
Accreditation Engineering & Materials Science
Authorization Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2018

  • 4563 Citations
  • 33 h-Index
  • 135 Conference contribution
  • 67 Article
  • 4 Chapter
  • 4 Editorial

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupé, A., Zhao, Z. & Ahn, G. J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupé, A., Shoshitaishvili, Y. & Ahn, G. J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January, p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G. J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Malware
Android (operating system)
Application programming interfaces (API)
Dynamic analysis
1 Citations

Efficient Anonymous Message Submission

Zhao, X., Li, L., Xue, G. & Ahn, G. J., Mar 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 217-230 14 p.

Research output: Contribution to journalArticle

Computation theory
Electrical engineering
Cryptography

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G. J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May, p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing

Projects 2008 2027