If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Conference contribution
2019

Effectively enforcing authorization constraints for emerging space-sensitive technologies

Rubio-Medrano, C. E., Jogani, S., Leitner, M., Zhao, Z. & Ahn, G-J., May 28 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 195-206 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Access control
Data privacy
Museums
Application programming interfaces (API)

ExSol: Collaboratively assessing cybersecurity risks for protecting energy delivery systems

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Apr 1 2019, 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2019 - Held as part of CPS Week, Proceedings. Institute of Electrical and Electronics Engineers Inc., 8738791. (7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2019 - Held as part of CPS Week, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk analysis
Risk assessment
Ontology
Erosion
Energy

SDNSOC: Object oriented SDN framework

Chowdhary, A., Huang, D., Ahn, G-J., Kang, M., Kim, A. & Velazquez, A., Mar 19 2019, SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019. Association for Computing Machinery, Inc, p. 7-12 6 p. 3309196. (SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Telecommunication traffic
Chemical analysis
Computer programming
Agglomeration

The danger of missing instructions: A systematic analysis of security requirements for MCPS

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Feb 21 2019, Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. (Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer Security
instruction
Delivery of Health Care
Quality of Health Care
Documentation

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors
2018

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems

Coughlin, V., Rubio-Medrano, C., Zhao, Z. & Ahn, G-J., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587430

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
Network security
Inspection
Network protocols
Monitoring
2 Citations (Scopus)

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby

Riskpol: A risk assessment framework for preventing attribute-forgery attacks to ABAC policies

Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Mar 14 2018, ABAC 2018 - Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 54-60 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Risk assessment

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visibility
Program processors
Monitoring
Internet of things
Coprocessor

VniDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems

Li, H., Hu, H., Gu, G., Ahn, G-J. & Zhang, F., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 17-34 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Virtualization
Elasticity
2017
11 Citations (Scopus)

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupe, A., Zhao, Z., Taguinod, M. & Ahn, G-J., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Uncertainty
41 Citations (Scopus)

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Pipelines
Malware
Neural networks
Graphics processing unit
6 Citations (Scopus)

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Kyung, S., Han, W., Tiwari, N., Dixit, V. H., Srinivas, L., Zhao, Z., Doupe, A. & Ahn, G-J., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
Controllers
Multicasting
Network architecture
Telecommunication traffic
2 Citations (Scopus)

Mutated policies: Towards proactive attribute-based defenses for access control

Rubio-Medrano, C. E., Lamp, J., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 30 2017, MTD 2017 - Proceedings of the 2017 Workshop on Moving Target Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 39-49 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Industry
3 Citations (Scopus)

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Dec 9 2017, Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

energy
Ontology
Ukraine
ontology
Energy
1 Citation (Scopus)

Poster: On the safety and efficiency of virtual firewall elasticity control

Li, H., Deng, J., Hu, H., Wang, K. C., Ahn, G-J., Zhao, Z. & Han, W., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F128644. p. 129-131 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elasticity
Controllers
Access control
Costs
Network function virtualization
1 Citation (Scopus)

Science DMZ: SDN based secured cloud testbed

Chowdhary, A., Dixit, V. H., Tiwari, N., Kyung, S., Huang, D. & Ahn, G-J., Dec 7 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-2 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Watches
Software defined networking
Industry
3 Citations (Scopus)

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 4 2017, Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry

Towards adaptive and proactive security assessment for energy delivery systems

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Oct 10 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2017 - Held as part of CPS Week, Proceedings. Institute of Electrical and Electronics Engineers Inc., 8064532

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Modernization
Computer networks
Energy
Attack
6 Citations (Scopus)

Towards automated threat intelligence fusion

Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupe, A., Ahn, G-J. & Black, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

intelligence
Fusion reactions
threat
event
workflow
12 Citations (Scopus)

Towards PII-based multiparty access control for photo sharing in Online Social Networks

Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K. & Ahn, G-J., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F128644. p. 155-166 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Level control
Electric current control
Specifications
2016
11 Citations (Scopus)

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing

Riad, K., Yan, Z., Hu, H. & Ahn, G-J., Mar 1 2016, Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 28-35 8 p. 7423062

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Access control
26 Citations (Scopus)

Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

Liao, K., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 8 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, Vol. 2016-June. p. 1-13 13 p. 7487938

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Ecosystems
Topology
Cybercrime
Payment
6 Citations (Scopus)

Checking intent-based communication in android with intent space analysis

Jing, Y., Ahn, G-J., Doupe, A. & Yi, J. H., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 735-746 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Access control
Experiments
15 Citations (Scopus)

HoneyMix: Toward SDN-based intelligent honeynet

Han, W., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 11 2016, SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
12 Citations (Scopus)

Moving target defense for Web applications using Bayesian Stackelberg games

Vadlamud, S. G., Sengupta, S., Taguinod, M., Zhao, Z., Doupe, A., Ahn, G-J. & Kambhampati, S., 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1377-1378 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Launching
Ecosystems
Masks
Switches

Position paper: Towards a moving target defense approach for attribute-based access control

Rubio-Medrano, C. E., Lamp, J., Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Mar 11 2016, ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 68-71 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Access control
Health
17 Citations (Scopus)

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 320-338 19 p. 7546510

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telephone
Electronic mail
Ecosystems
Costs
6 Citations (Scopus)

State-Aware network access management for software-defined networks

Han, W., Hu, H., Zhao, Z., Doupe, A., Ahn, G-J., Wang, K. C. & Deng, J., Jun 6 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. 06-08-June-2016. p. 1-11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Access control
Throughput
Degradation
Controllers
1 Citation (Scopus)

Understanding anti-forensic techniques with timestamp manipulation

Jang, D. I., Ahn, G-J., Hwang, H. & Kim, K., 2016, Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016. Institute of Electrical and Electronics Engineers Inc., p. 609-614 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Manipulation
Malware
Incidents
Knowledge base
Leverage
22 Citations (Scopus)

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls

Deng, J., Hu, H., Li, H., Pan, Z., Wang, K. C., Ahn, G-J., Bi, J. & Park, Y., Jan 19 2016, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network, NFV-SDN 2015. Institute of Electrical and Electronics Engineers Inc., p. 107-114 8 p. 7387414

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer system firewalls
Topology
Network function virtualization
Software defined networking
2015
1 Citation (Scopus)

Achieving security assurance with assertion-based application construction

Rubio-Medrano, C. E., Ahn, G-J. & Sohr, K., Jan 19 2015, CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. Institute of Electrical and Electronics Engineers Inc., p. 503-510 8 p. 7014605

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Application programs
Access control
Specifications
Defects
10 Citations (Scopus)

ACTRA - A case study for threat information sharing

Haass, J. C., Ahn, G-J. & Grimmelmann, F., Oct 12 2015, WISCS 2015 - Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, co-located with: CCS 2015. Association for Computing Machinery, Inc, p. 23-26 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Profitability

Discovering and analyzing deviant communities: Methods and experiments

Paxton, N. C., Jang, D. I., Moskowitz, I. S., Ahn, G-J. & Russell, S., Jan 19 2015, CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. Institute of Electrical and Electronics Engineers Inc., p. 163-170 8 p. 7014561

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
Computer networks
Botnet
Controllers
5 Citations (Scopus)

Federated access management for collaborative network environments: Framework and case study

Rubio-Medrano, C. E., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 1 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. Association for Computing Machinery, Vol. 2015-June. p. 125-134 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Access control
Bandwidth
Communication
18 Citations (Scopus)

Toward a Moving Target Defense for Web Applications

Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 19 2015, Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015. Institute of Electrical and Electronics Engineers Inc., p. 510-517 8 p. 7301020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web application
Launching
Ecosystems
Industry
Vulnerability
2 Citations (Scopus)

Utilizing network science and honeynets for software induced cyber incident analysis

Paxton, N. C., Jang, D. I., Russell, S., Ahn, G-J., Moskowitz, I. S. & Hyden, P., Mar 26 2015, Proceedings of the Annual Hawaii International Conference on System Sciences. IEEE Computer Society, Vol. 2015-March. p. 5244-5252 9 p. 7070445

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software agents
Network security
Malware
2014
142 Citations (Scopus)

FLOWGUARD: Building robust firewalls for software-defined networks

Hu, H., Han, W., Ahn, G-J. & Zhao, Z., 2014, HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking. Association for Computing Machinery, p. 97-102 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer system firewalls
Visibility
Topology
Experiments
Software defined networking
28 Citations (Scopus)

Game theoretic analysis of MultiParty Access Control in online social networks

Hu, H., Ahn, G-J., Zhao, Z. & Yang, D., 2014, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. Association for Computing Machinery, p. 93-102 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Controllers
Numerical analysis
6 Citations (Scopus)

LPM: Layered policy management for software-defined networks

Han, W., Hu, H. & Ahn, G-J., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8566 LNCS. p. 356-363 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networking
Software
Complex networks
Network architecture
Network Architecture
40 Citations (Scopus)

Morpheus: Automatically generating heuristics to detect android emulators

Jing, Y., Zhao, Z., Ahn, G-J. & Hu, H., Dec 8 2014, ACM International Conference Proceeding Series. December ed. Association for Computing Machinery, Vol. 2014-December. p. 216-225 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Malware
77 Citations (Scopus)

Policy-driven security management for fog computing: Preliminary framework and a case study

Dsouza, C., Ahn, G-J. & Taguinod, M., Feb 27 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014. Institute of Electrical and Electronics Engineers Inc., p. 16-23 8 p. 7051866

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Cloud computing
Interoperability
Mobile devices
Internet
39 Citations (Scopus)

RiskMon: Continuous and automated risk assessment of mobile applications

Jing, Y., Ahn, G-J., Zhao, Z. & Hu, H., 2014, CODASPY 2014 - Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 99-110 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk assessment

WPES 2014: 13th Workshop on Privacy in the Electronic Society

Ahn, G-J. & Datta, A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1546-1547 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Communication
Secure communication