Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    RARE: A Systematic Augmented Router Emulation for Malware Analysis

    How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has rec...

    Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos in Passive and Active Measurement (2018)

  2. No Access

    Chapter and Conference Paper

    Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts

    As we move into the mobile era, many functionalities in standard web services are being re-implemented in mobile apps and services, including many security-related functionalities. However, it has been observe...

    Arash Alavi, Alan Quach, Hang Zhang, Bryan Marsh in Passive and Active Measurement (2017)

  3. No Access

    Chapter and Conference Paper

    M/I Adaptation Layer Network Protocol for IoT Based on 6LoWPAN

    The four-layer network protocol architecture for Internet of Things is proposed based on 6LoWPAN, and the M/I adaptation layer, as the key of the protocol architecture, achieve the integration between underlyi...

    Zhihong Qian, Yijun Wang, Xue Wang, Shuang Zhu in Internet of Things (2012)

  4. No Access

    Chapter and Conference Paper

    Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks

    Managing numerous security vulnerabilities has long been a difficult and daunting task especially due to the complexity, heterogeneity, and various operational constraints of the network. In this paper, we foc...

    Zhiyun Qian, Z. Morley Mao, Ammar Rayes in Security and Privacy in Communication Netw… (2012)