Ahmed Abusnaina
Ahmed Abusnaina
Verified email at knights.ucf.edu
Title
Cited by
Cited by
Year
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
332019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
222019
Sensor-based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
102020
Examining adversarial learning against graph-based iot malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
arXiv preprint arXiv:1902.04416, 2019
62019
Investigating online toxicity in users interactions with the mainstream media channels on YouTube
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
The 5th International Workshop on Mining Actionable Insights from Social …, 2020
52020
COPYCAT: practical adversarial attacks on visualization-based malware detection
A Khormali, A Abusnaina, S Chen, DH Nyang, A Mohaisen
arXiv preprint arXiv:1909.09735, 2019
52019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
42020
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
42019
Honor among thieves: Towards understanding the dynamics and interdependencies in iot botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
42019
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube
S Alshamrani, A Abusnaina, D Mohaisen
arXiv preprint arXiv:2009.07923, 2020
32020
Subgraph-based adversarial examples against graph-based iot malware detection systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ...
International Conference on Computational Data and Social Networks, 268-281, 2019
32019
Breaking graph-based IoT malware detection systems using adversarial examples: Poster
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
32019
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
12020
Examining the security of ddos detection systems in software defined networks
A Abusnaina, DH Nyang, M Yuksel, A Mohaisen
Proceedings of the 15th International Conference on emerging Networking …, 2019
12019
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
arXiv preprint arXiv:2103.14221, 2021
2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
arXiv preprint arXiv:2103.09050, 2021
2021
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments
S Alshamrani, A Abusnaina, M Abuhamad, A Lee, DH Nyang, ...
International Conference on Computational Data and Social Networks, 73-86, 2020
2020
From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
2020
Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
A Abusnaina, M Abuhamad, DH Nyang, S Chen, A Wang, D Mohaisen
International Conference on Information Security Applications, 362-374, 2020
2020
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20