Seguir
Mobin Javed
Mobin Javed
Assistant Professor at LUMS
No hay ninguna dirección de correo electrónico verificada. - Página principal
Título
Citado por
Citado por
Año
Detecting Credential Spearphishing in Enterprise Settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
26th USENIX Security Symposium, 2017
1442017
Adblocking and Counter Blocking: A Slice of the Arms Race.
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
FOCI, 2016
1072016
Do You See What I See? Differential Treatment of Anonymous Users.
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, D McCoy, V Paxson, ...
NDSS, 2016
972016
Detecting stealthy, distributed SSH brute-forcing
M Javed, V Paxson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
942013
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ...
30th USENIX Security Symposium, 2021, 2021
702021
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
S Khattak, M Javed, PD Anderson, V Paxson
FOCI, 2013
682013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
V Paxson, M Christodorescu, M Javed, JR Rao, R Sailer, DL Schales, ...
USENIX Security Symposium, 17-32, 2013
662013
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
562011
A look at the consequences of internet censorship through an ISP lens
S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014
532014
Scanning the internet for liveness
S Bano, P Richter, M Javed, S Sundaresan, Z Durumeric, SJ Murdoch, ...
ACM SIGCOMM Computer Communication Review 48 (2), 2-9, 2018
432018
Deepfake Videos in the Wild: Analysis and Detection
J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ...
Proceedings of the Web Conference 2021, 981-992, 2021
422021
Deepfake Text Detection: Limitations and Opportunities
J Pu, Z Sarwar, SM Abdullah, A Rehman, Y Kim, P Bhattacharya, M Javed, ...
2023 IEEE Symposium on Security and Privacy (SP), 19-36, 2022
332022
An information-theoretic combining method for multi-classifier anomaly detection systems
AB Ashfaq, M Javed, SA Khayam, H Radha
Communications (ICC), 2010 IEEE international conference on, 1-5, 2010
282010
A bestiary of blocking: The motivations and modes behind website unavailability
MC Tschantz, S Afroz, S Sajid, SA Qazi, M Javed, V Paxson
8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2018
252018
Exploring server-side blocking of regions
S Afroz, MC Tschantz, S Sajid, SA Qazi, M Javed, V Paxson
arXiv preprint arXiv:1805.11606, 2018
212018
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
202018
Information theoretic feature space slicing for statistical anomaly detection
AB Ashfaq, S Rizvi, M Javed, SA Khayam, MQ Ali, E Al-Shaer
Journal of Network and Computer Applications 41, 473-487, 2014
182014
Towards mining latent client identifiers from network traffic
S Jain, M Javed, V Paxson
Proceedings on Privacy Enhancing Technologies 2016 (2), 100-114, 2016
172016
On the Inefficient Use of Entropy for Anomaly Detection.
M Javed, AB Ashfaq, MZ Shafiq, SA Khayam
RAID, 369-370, 2009
152009
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel
H Khan, M Javed, F Mirza, SA Khayam
National University of Science & Technology (NUST), Islamabad 44000, 2009
152009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20