M. Zubair Rafique
M. Zubair Rafique
Dirección de correo verificada de technogenics.io - Página principal
Citado por
Citado por
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
CCS, 2012
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
MZ Rafique, J Caballero
Research in Attacks, Intrusions and Defenses (RAID), 2013
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting
A Nappa, MZ Rafique, J Caballero
In Proceedings of the10th Conference on Detection of Intrusions and Malware …, 2013
The MALICIA dataset: identification and analysis of drive-by download operations
A Nappa, MZ Rafique, J Caballero
International Journal of Information Security 14 (1), 15-33, 2015
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services
N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ...
WWW 2014, 2014
Evaluating DoS attacks against SIP-based VoIP systems
MZ Rafique, M Ali Akbar, M Farooq
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
It’s Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
NDSS 2016, 2016
Evolutionary Algorithms for Classification of Malware Families through Different Network Behaviors
MZ Rafique, P Chen, C Huygens, W Joosen
Proceedings of the ACM Genetic and Evolutionary Computation Conference (GECCO), 2014
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers
A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu
NDSS 2014, 2014
SMS SPAM detection by operating on byte-level distributions using hidden markov models (HMMs)
MZ Rafique, M Farooq
Virus Bulletin, 2010
Application of evolutionary algorithms in detecting SMS spam at access layer
MZ Rafique, N Alrayes, MK Khan
Genetic and Evolutionary Computing Conference (GECCO) 2011, 2011
Graph-based learning model for detection of SMS spam on smart phones
MZ Rafique, M Abulaish
2012 8th International Wireless Communications and Mobile Computing …, 2012
Network Dialog Minimization and Network Dialog Diffing: Two Novel Primitives for Network Security Applications
MZ Rafique, J Caballero, C Huygens, W Joosen
ACSAC 2014, 2014
Embedding high capacity covert channels in Short Message Service (SMS)
MZ Rafique, MK Khan, K Alghatbar, M Farooq
Secure and Trust Computing, Data Management and Applications, 1-10, 2011
Securing IP-multimedia subsystem (IMS) against anomalous message exploits by using machine learning algorithms
MZ Rafique, ZS Khan, MK Khan, K Alghatbar
2011 Eighth International Conference on Information Technology: New …, 2011
A data mining framework for securing 3g core network from GTP fuzzing attacks
F Ahmed, MZ Rafique, M Abulaish
International Conference on Information Systems Security, 280-293, 2011
A framework for detecting malformed sms attack
MZ Rafique, MK Khan, K Alghathbar, M Farooq
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
MESSIAH: To Nip the Exploits in the Bud
MZ Rafique, MA Yaqub, M Farooq
Be Liberal in What You Recieve’on your mobile phone
MZ Rafique, M Farooq
Proceedings of 20th Virus Bulletin Conference, 2010
Advances in Defense against Cybercrime
M Rafique
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20