Yazan Boshmaf

Orcid: 0000-0002-0816-6924

According to our database1, Yazan Boshmaf authored at least 26 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dizzy: Large-Scale Crawling and Analysis of Onion Services.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Dizzy: Large-Scale Crawling and Analysis of Onion Services.
CoRR, 2022

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2020
Deanonymizing Tor hidden service users through Bitcoin transactions analysis.
Comput. Secur., 2020

Investigating MMM Ponzi Scheme on Bitcoin.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Characterizing Bitcoin donations to open source software on GitHub.
CoRR, 2019

BlockTag: Design and Applications of a Tagging System for Blockchain Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis.
CoRR, 2018

Source Attribution of Cryptographic API Misuse in Android Applications.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Pervasive Mob. Comput., 2016

Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs.
Comput. Secur., 2016

Visualization of actionable knowledge to mitigate DRDoS attacks.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Interacting with Large Distributed Datasets Using Sketch.
Proceedings of the 16th Eurographics Symposium on Parallel Graphics and Visualization, 2016

2015
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Thwarting Fake OSN Accounts by Predicting their Victims.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
To Befriend Or Not? A Model of Friend Request Acceptance on Facebook.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

2013
Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments.
ACM Trans. Auton. Adapt. Syst., 2013

Design and analysis of a social botnet.
Comput. Networks, 2013

Know your enemy: the risk of unauthorized access in smartphones by insiders.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Graph-based Sybil detection in social and information systems.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Key Challenges in Defending Against Malicious Socialbots.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Understanding Users' Requirements for Data Protection in Smartphones.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

2011
The socialbot network: when bots socialize for fame and money.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
A billion keys, but few locks: the crisis of web single sign-on.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units.
Proc. VLDB Endow., 2009


  Loading...