Follow
Ali Zand
Ali Zand
Google
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
253*2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
NDSS 17, 10-14722, 2017
1362017
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1252020
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sedighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
662017
Targeted attacks against industrial control systems: Is the power industry prepared?
MB Line, A Zand, G Stringhini, R Kemmerer
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 13-22, 2014
652014
Hit'em where it hurts: a live security exercise on cyber situational awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the 27th Annual Computer Security Applications Conference, 51-61, 2011
632011
Extracting Probable Command and Control Signatures for Detecting Botnets
A Zand, G Vigna, X Yan, C Kruegel
Symposium On Applied Computing (SAC), 2014
472014
Rippler: Delay injection for service dependency detection
A Zand, G Vigna, R Kemmerer, C Kruegel
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2157-2165, 2014
332014
Nexat: A history-based approach to predict attacker actions
C Cipriano, A Zand, A Houmansadr, C Kruegel, G Vigna
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
332011
Who is targeted by email-based phishing and malware? measuring factors that differentiate risk
C Simoiu, A Zand, K Thomas, E Bursztein
Proceedings of the ACM Internet Measurement Conference, 567-576, 2020
302020
Demystifying DDoS as a service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
172017
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
122016
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, et al. 2017. Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proc. CCS 10 (3133956.3134067), 0
11
Know your achilles' heel: Automatic detection of network critical services
A Zand, A Houmansadr, G Vigna, R Kemmerer, C Kruegel
Proceedings of the 31st Annual Computer Security Applications Conference, 41-50, 2015
102015
& Margolis, D.(2017, October). Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 0
6
Contextualizing Network Security
A Zand
University of California, Santa Barbara, 2015
12015
A Voting-Based Architecture for Survivable Hierarchical IDSes
A Zand, B Sadeghian
2009
The system can't perform the operation now. Try again later.
Articles 1–17