Mobin Javed
Mobin Javed
Assistant Professor at LUMS
No hay ninguna dirección de correo electrónico verificada. - Página principal
Citado por
Citado por
Detecting Credential Spearphishing in Enterprise Settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
26th USENIX Security Symposium, 2017
Adblocking and Counter Blocking: A Slice of the Arms Race.
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
FOCI, 2016
Do You See What I See? Differential Treatment of Anonymous Users.
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, D McCoy, V Paxson, ...
NDSS, 2016
Detecting stealthy, distributed SSH brute-forcing
M Javed, V Paxson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
V Paxson, M Christodorescu, M Javed, JR Rao, R Sailer, DL Schales, ...
USENIX Security Symposium, 17-32, 2013
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
S Khattak, M Javed, PD Anderson, V Paxson
FOCI, 2013
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
A look at the consequences of internet censorship through an ISP lens
S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014
An information-theoretic combining method for multi-classifier anomaly detection systems
AB Ashfaq, M Javed, SA Khayam, H Radha
Communications (ICC), 2010 IEEE international conference on, 1-5, 2010
Scanning the internet for liveness
S Bano, P Richter, M Javed, S Sundaresan, Z Durumeric, SJ Murdoch, ...
ACM SIGCOMM Computer Communication Review 48 (2), 2-9, 2018
Exploring server-side blocking of regions
S Afroz, MC Tschantz, S Sajid, SA Qazi, M Javed, V Paxson
arXiv preprint arXiv:1805.11606, 2018
A bestiary of blocking: The motivations and modes behind website unavailability
MC Tschantz, S Afroz, S Sajid, SA Qazi, M Javed, V Paxson
8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2018
Information theoretic feature space slicing for statistical anomaly detection
AB Ashfaq, S Rizvi, M Javed, SA Khayam, MQ Ali, E Al-Shaer
Journal of Network and Computer Applications 41, 473-487, 2014
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer
Q Lone, M Luckie, M Korczyński, H Asghari, M Javed, M van Eeten
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
Towards mining latent client identifiers from network traffic
S Jain, M Javed, V Paxson
Proceedings on Privacy Enhancing Technologies 2016 (2), 100-114, 2016
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel
H Khan, M Javed, F Mirza, SA Khayam
National University of Science & Technology (NUST), Islamabad 44000, 2009
On the Inefficient Use of Entropy for Anomaly Detection.
M Javed, AB Ashfaq, MZ Shafiq, SA Khayam
RAID, 369-370, 2009
Measurement and Analysis of Traffic Exchange Services
M Javed, C Herley, M Peinado, V Paxson
Proceedings of the 2015 ACM Conference on Internet Measurement Conference, 1-12, 2015
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ...
30th USENIX Security Symposium, 2021, 2021
Detecting Credential Compromise in Enterprise Networks
M Javed
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20