Aditya K. Sood

According to our database1, Aditya K. Sood authored at least 18 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
The art of mapping IoT devices in networks.
Netw. Secur., 2018

A key-management-based taxonomy for ransomware.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2017
Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats.
IEEE Syst. J., 2017

Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels.
IEEE Commun. Mag., 2017

2016
An Empirical Study of HTTP-based Financial Botnets.
IEEE Trans. Dependable Secur. Comput., 2016

Drive-By Download Attacks: A Comparative Study.
IT Prof., 2016

A Taxonomy of Domain-Generation Algorithms.
IEEE Secur. Priv., 2016

2013
Cybercrime: Dissecting the State of Underground Enterprise.
IEEE Internet Comput., 2013

Crimeware-as-a-service - A survey of commoditized crimeware in the underground market.
Int. J. Crit. Infrastructure Prot., 2013

Targeted Cyberattacks: A Superset of Advanced Persistent Threats.
IEEE Secur. Priv., 2013

Dissecting SpyEye - Understanding the design of third generation botnets.
Comput. Networks, 2013

Improving performance of rate control mechanism for UDP traffic over heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2013

2012
Abusing Glype proxies: attacks, exploits and defences.
Netw. Secur., 2012

2011
Frametrapping the framebusting defence.
Netw. Secur., 2011

Spying on the browser: dissecting the design of malicious extensions.
Netw. Secur., 2011

2010
The Conundrum of Declarative Security HTTP Response Headers: Lessons Learned.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

2008
Hacking 802.11 Protocol Insecurities.
login Usenix Mag., 2008

Insecurities in Designing XML Signatures.
login Usenix Mag., 2008


  Loading...