Follow
Yacin Nadji
Title
Cited by
Cited by
Year
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
723*
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Y Nadji, P Saxena, D Song
NDSS 20, 2009
2792009
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1032013
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE symposium on security and privacy (SP), 691-706, 2016
952016
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
922017
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
892016
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
652014
Automated remote repair for mobile malware
Y Nadji, J Giffin, P Traynor
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
652011
Connected colors: Unveiling the structure of criminal networks
Y Nadji, M Antonakakis, R Perdisci, W Lee
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
342013
MalwareVis: entity-based visualization of malware network traces
W Zhuo, Y Nadjin
Proceedings of the ninth international symposium on visualization for cyber …, 2012
342012
Just awful enough: the functional dysfunction of the something awful forums
JA Pater, Y Nadji, ED Mynatt, AS Bruckman
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
312014
Understanding the privacy implications of ecs
P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
292016
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games
Y Nadji, M Antonakakis, R Perdisci, W Lee
252011
Towards designing effective visualizations for DNS-based network threat analysis
R Romero-Gomez, Y Nadji, M Antonakakis
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
222017
Financial Lower Bounds of Online Advertising Abuse: A Four Year Case Study of the TDSS/TDL4 Botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
202016
Still beheading hydras: Botnet takedowns then and now
Y Nadji, R Perdisci, M Antonakakis
IEEE Transactions on Dependable and Secure Computing 14 (5), 535-549, 2015
202015
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
112017
Measuring network reputation in the ad-bidding process
Y Chen, Y Nadji, R Romero-Gómez, M Antonakakis, D Dagon
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
102017
See no evil: Evasions in honeymonkey systems
B Dolan-Gavitt, Y Nadji
Technical report, Technical Report, 2010
72010
Understanding DNS-Based Criminal Infrastructure for Informing Takedowns
YI Nadji
Ph. D. Thesis, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20