A Survey of Binary Code Similarity IU Haq, J Caballero ACM Computing Surveys (CSUR) 54 (3), 1-38, 2021 | 172 | 2021 |
On mitigating sampling-induced accuracy loss in traffic anomaly detection systems S Ali, IU Haq, S Rizvi, N Rasheed, U Sarfraz, SA Khayam, F Mirza ACM SIGCOMM Computer Communication Review 40 (3), 4-16, 2010 | 43 | 2010 |
Malware Lineage in the Wild IU Haq, S Chica, J Caballero, S Jha Computers & Security, 347-363, 2018 | 42 | 2018 |
What is the impact of p2p traffic on anomaly detection? IU Haq, S Ali, H Khan, SA Khayam Recent Advances in Intrusion Detection, 1-17, 2010 | 29 | 2010 |
Ayudante: Identifying Undesired Variable Interactions IU Haq, J Caballero, MD Ernst WODA 2015: 13th Workshop on Dynamic Analysis, 2015 | 9 | 2015 |
Lineage Inference of Packed Malware using Binary Code Similarity IU Haq IMDEA Software Institute, 2019 | | 2019 |