Samaneh Tajalizadehkhoob

According to our database1, Samaneh Tajalizadehkhoob authored at least 16 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Intercept and Inject: DNS Response Manipulation in the Wild.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Block and Roll: A Metric-based Evaluation of Reputation Block Lists.
Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), 2023

2022
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022

2019
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
ACM Trans. Internet Techn., 2018

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

No domain left behind: is Let's Encrypt democratizing encryption?
Proceedings of the Applied Networking Research Workshop, 2017

2016
Developing Security Reputation Metrics for Hosting Providers.
CoRR, 2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016


  Loading...