Afsah Anwar
Afsah Anwar
Verified email at knights.ucf.edu - Homepage
Title
Cited by
Cited by
Year
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
362019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
242018
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
222019
RouteChain: towards blockchain-based secure and efficient BGP routing
M Saad, A Anwar, A Ahmad, H Alasmary, M Yuksel, A Mohaisen
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
212019
Examining adversarial learning against graph-based iot malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
arXiv preprint arXiv:1902.04416, 2019
62019
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
52019
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
52019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
42020
Honor among thieves: Towards understanding the dynamics and interdependencies in iot botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
42019
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection
A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen
International Conference on Information and Communications Security, 443-461, 2020
32020
Breaking graph-based IoT malware detection systems using adversarial examples: Poster
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
32019
Understanding the hidden cost of software vulnerabilities: Measurements and predictions
A Anwar, A Khormali, DH Nyang, A Mohaisen
International Conference on Security and Privacy in Communication Systems …, 2018
3*2018
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks, 107699, 2020
12020
Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross‐Layer Profiling
H Alasmary, A Anwar, LL Njilla, CA Kamhoua, A Mohaisen
Modeling and Design of Secure Internet of Things, 249-272, 2020
12020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
12020
Domain name system security and privacy: A contemporary survey (vol 185, 107699, 2020)
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
COMPUTER NETWORKS 188, 2021
2021
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
A Anwar, J Choi, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ...
arXiv preprint arXiv:2103.14217, 2021
2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
arXiv preprint arXiv:2103.14221, 2021
2021
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen
arXiv preprint arXiv:2006.15074, 2020
2020
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
arXiv preprint arXiv:2005.07145, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20