Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection G Gu, R Perdisci, J Zhang, W Lee | 1551 | 2008 |
BotSniffer: Detecting botnet command and control channels in network traffic G Gu, J Zhang, W Lee | 1185 | 2008 |
Detecting stealthy P2P botnets using statistical traffic fingerprints J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 167 | 2011 |
Arrow: Generating signatures to detect drive-by downloads J Zhang, C Seifert, JW Stokes, W Lee Proceedings of the 20th international conference on World wide web, 187-196, 2011 | 146 | 2011 |
Building a scalable system for stealthy p2p-botnet detection J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz IEEE transactions on information forensics and security 9 (1), 27-38, 2013 | 116 | 2013 |
Boosting the scalability of botnet detection using adaptive traffic sampling J Zhang, X Luo, R Perdisci, G Gu, W Lee, N Feamster Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 53 | 2011 |
Net-cohort: Detecting and managing vm ensembles in virtualized data centers L Hu, K Schwan, A Gulati, J Zhang, C Wang Proceedings of the 9th international conference on Autonomic computing, 3-12, 2012 | 49 | 2012 |
An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network J Leng, Y Zhou, J Zhang, C Hu arXiv preprint arXiv:1504.03095, 2015 | 47 | 2015 |
Exposing invisible timing-based traffic watermarks with BACKLIT X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 43 | 2011 |
Detecting fake anti-virus software distribution webpages DW Kim, P Yan, J Zhang Computers & Security 49, 95-106, 2015 | 42 | 2015 |
On the secrecy of spread-spectrum flow watermarks X Luo, J Zhang, R Perdisci, W Lee European Symposium on Research in Computer Security, 232-248, 2010 | 36 | 2010 |
Exploiting the vulnerability of flow table overflow in software-defined network: Attack model, evaluation, and defense Y Zhou, K Chen, J Zhang, J Leng, Y Tang Security and Communication Networks 2018, 2018 | 33 | 2018 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions Y Zhou, DW Kim, J Zhang, L Liu, H Jin, H Jin, T Liu IEEE Access 5, 1990-1999, 2017 | 30 | 2017 |
Morphing communications of cyber-physical systems towards moving-target defense Y Li, R Dai, J Zhang 2014 IEEE International Conference on Communications (ICC), 592-598, 2014 | 26 | 2014 |
DNSRadar: Outsourcing malicious domain detection based on distributed cache-footprints X Ma, J Zhang, J Tao, J Li, J Tian, X Guan IEEE Transactions on Information Forensics and Security 9 (11), 1906-1921, 2014 | 22 | 2014 |
Intention and Origination: An Inside Look at Large-Scale Bot Queries. J Zhang, Y Xie, F Yu, D Soukal, W Lee Ndss, 2013 | 22 | 2013 |
You are how you query: Deriving behavioral fingerprints from DNS traffic DW Kim, J Zhang International Conference on Security and Privacy in Communication Systems …, 2015 | 19 | 2015 |
Accurate DNS query characteristics estimation via active probing X Ma, J Zhang, Z Li, J Li, J Tao, X Guan, JCS Lui, D Towsley Journal of Network and Computer Applications 47, 72-84, 2015 | 17 | 2015 |
UChecker: Automatically detecting php-based unrestricted file upload vulnerabilities J Huang, Y Li, J Zhang, R Dai 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 13 | 2019 |
ShellBreaker: Automatically detecting PHP-based malicious web shells Y Li, J Huang, A Ikusan, M Mitchell, J Zhang, R Dai Computers & Security 87, 101595, 2019 | 11 | 2019 |