Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani Computer Networks 121, 25-36, 2017 | 210 | 2017 |
Towards a network-based framework for android malware detection and characterization AH Lashkari, AFA Kadir, H Gonzalez, KF Mbah, AA Ghorbani 2017 15th Annual Conference on Privacy, Security and Trust (PST), 233-23309, 2017 | 139 | 2017 |
Code authorship attribution: Methods and challenges V Kalgutkar, R Kaur, H Gonzalez, N Stakhanova, A Matyukhina ACM Computing Surveys (CSUR) 52 (1), 1-36, 2019 | 96 | 2019 |
DroidKin: Lightweight Detection of Android Apps Similarity H Gonzalez, N Stakhanova, AA Ghorbani Proceedings of the 10th SECURECOMM, 2014 | 83 | 2014 |
Exploring reverse engineering symptoms in Android apps H Gonzalez, AA Kadir, N Stakhanova, AJ Alzahrani, AA Ghorbani Proceedings of the Eighth European Workshop on System Security, 1-7, 2015 | 45 | 2015 |
Application-layer denial of service attacks: taxonomy and survey G Mantas, N Stakhanova, H Gonzalez, HH Jazi, AA Ghorbani International Journal of Information and Computer Security 7 (2-4), 216-239, 2015 | 45 | 2015 |
Enriching reverse engineering through visual exploration of Android binaries A Jain, H Gonzalez, N Stakhanova Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015 | 34 | 2015 |
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps R Kaur, Y Li, J Iqbal, H Gonzalez, N Stakhanova 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 31 | 2018 |
Types of hosts on a Remote File Inclusion (RFI) botnet HFG Robledo 2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA'08 …, 2008 | 28 | 2008 |
Cybersecurity Teaching through Gamification: Aligning Training Resources to our Syllabus H Gonzalez, R Llamas, F Ordaz Research in Computing Science 146, 35-43, 2017 | 25 | 2017 |
Authorship Attribution of Android Apps H Gonzalez, N Stakhanova, AA Ghorbani Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 21 | 2018 |
The Impact of Application-Layer Denial-of-Service Attacks H Gonzalez, MA Gosselin-Lavigne, N Stakhanova, AA Ghorbani Case Studies in Secure Computing: Achievements and Trends, 261, 2014 | 19 | 2014 |
Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones AJ Alzahrani, N Stakhanova, H Gonzalez, AA Ghorbani Journal of Cyber Security and Mobility, 2014 | 15 | 2014 |
Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course H Gonzalez, R Llamas, O Montaño Research in Computing Science 148 (5), 133–141, 2019 | 14 | 2019 |
A performance evaluation of hash functions for IP reputation lookup using bloom filters MA Gosselin-Lavigne, H Gonzalez, N Stakhanova, AA Ghorbani 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 12 | 2015 |
Unmasking Android Obfuscation Tools Using Spatial Analysis R Kaur, Y Ning, H Gonzalez, N Stakhanova 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018 | 11 | 2018 |
Measuring code reuse in Android apps H Gonzalez, N Stakhanova, AA Ghorbani 2016 14th Annual Conference on Privacy, Security and Trust (PST), 187-195, 2016 | 11 | 2016 |
Phishing by form: The abuse of form sites H Gonzalez, K Nance, J Nazario 2011 6th International Conference on Malicious and Unwanted Software, 95-101, 2011 | 7 | 2011 |
A novel framework for generating personalized network datasets for nids based on traffic aggregation P Velarde-Alvarado, H Gonzalez, R Martínez-Peláez, LJ Mena, ... Sensors 22 (5), 1847, 2022 | 5 | 2022 |
Analyzing characteristics of malicious PDFs HF Gonzalez-Robledo IEEE Latin America Transactions 10 (3), 1767-1773, 2012 | 5 | 2012 |