팔로우
Ziming Zhao (赵子铭)
Ziming Zhao (赵子铭)
Associate Professor, Northeastern University
northeastern.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Deep Android Malware Detection
N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ...
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
6092017
FlowGuard: Building Robust Firewalls for Software-Defined Networks
H Hu, W Han, GJ Ahn, Z Zhao
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014
3792014
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016
2292016
Uncovering the Face of Android Ransomware: Characterization and Real-time Detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security (TIFS) 13 (5), 1286-1300, 2017
1902017
Matched and mismatched socs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
ACM SIGSAC Conference on Computer and Communications Security (CCS), 1955-1970, 2019
1542019
Morpheus: Automatically Generating Heuristics to Detect Android Emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Annual Computer Security Applications Conference (ACSAC), 2014
1382014
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
IEEE Symposium on Security and Privacy (Oakland), 2016
1372016
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), 2014
1082014
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
892016
Risk-Aware Mitigation for MANET Routing Attacks
Z Zhao, H Hu, G Ahn, R Wu
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012
892012
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, A Gail-Joon
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015
882015
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
H Hu, GJ Ahn, Z Zhao, D Yang
ACM Symposium on Access Control Models and Technologies (SACMAT), 2014
812014
On the Security of Picture Gesture Authentication
Z Zhao, GJ Ahn, JJ Seo, H Hu
USENIX Security Symposium, 2013
802013
Dandroid: A multi-view discriminative adversarial network for obfuscated android malware detection
S Millar, N McLaughlin, J Martinez del Rincon, P Miller, Z Zhao
ACM conference on data and application security and privacy (CODASPY), 353-364, 2020
782020
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
International Conference on Autonomous Agents and Multiagent Systems, 2017
752017
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks
C Wu, K He, J Chen, Z Zhao, R Du
USENIX Security Symposium, 2020
682020
Users Really Do Answer Telephone Scams
H Tu, A Doupé, Z Zhao, GJ Ahn
USENIX Security Symposium, 1327-1340, 2019
682019
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Annual Computer Security Applications Conference (ACSAC), 2018
602018
HoneyProxy: Design and implementation of next-generation honeynet via SDN
S Kyung, W Han, N Tiwari, VH Dixit, L Srinivas, Z Zhao, A Doupé, GJ Ahn
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
602017
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Z Zhao, GJ Ahn, H Hu
ACM Transactions on Information and System Security (TISSEC), 2015
562015
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20