Yacin Nadji
Title
Cited by
Cited by
Year
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
481*
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Y Nadji, P Saxena, D Song
NDSS 20, 2009
2412009
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
732013
Automated remote repair for mobile malware
Y Nadji, J Giffin, P Traynor
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
602011
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
532016
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
402014
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
382016
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Connected colors: Unveiling the structure of criminal networks
Y Nadji, M Antonakakis, R Perdisci, W Lee
International Workshop on Recent Advances in Intrusion Detection, 390-410, 2013
272013
MalwareVis: entity-based visualization of malware network traces
W Zhuo, Y Nadjin
Proceedings of the ninth international symposium on visualization for cyber …, 2012
242012
Understanding the privacy implications of ecs
P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis
International Conference on Detection of Intrusions and Malware, and …, 2016
182016
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games
Y Nadji, M Antonakakis, R Perdisci, W Lee
172011
Just awful enough: the functional dysfunction of the something awful forums
JA Pater, Y Nadji, ED Mynatt, AS Bruckman
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
162014
Financial lower bounds of online advertising abuse
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
International conference on Detection of Intrusions and Malware, and …, 2016
132016
Still beheading hydras: Botnet takedowns then and now
Y Nadji, R Perdisci, M Antonakakis
IEEE Transactions on Dependable and Secure Computing 14 (5), 535-549, 2015
112015
Towards designing effective visualizations for DNS-based network threat analysis
R Romero-Gomez, Y Nadji, M Antonakakis
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
92017
Measuring network reputation in the ad-bidding process
Y Chen, Y Nadji, R Romero-Gómez, M Antonakakis, D Dagon
International Conference on Detection of Intrusions and Malware, and …, 2017
92017
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
72017
See No Evil: Evasions in Honeymonkey Systems
B Dolan-Gavitt, Y Nadji
Technical Report, 2010
62010
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains
C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
IEEE Security & Privacy 15 (2), 70-77, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20