Mohaisen, Aziz
116  results:
Search for persons X
?
1

ProMT : optimizing integrity tree updates for write-inte..:

, In: Proceedings of the 35th ACM International Conference on Supercomputing,
Alwadi, Mazen ; Mohaisen, Aziz ; Awad, Amro - p. 479-490 , 2021
 
?
4

Cyber Deception in the Internet of Battlefield Things: Tech..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Park, Jeman ; Mohaisen, Aziz ; Kamhoua, Charles A.... - p. 299-312 , 2020
 
?
5

GraphShield: Dynamic Large Graphs for Secure Queries with F..:

Du, Minxin ; Wu, Shuangke ; Wang, Qian...
IEEE Transactions on Knowledge and Data Engineering.  , 2020
 
?
6

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC..:

Mohaisen, Aziz ; Gu, Zhongshu ; Ren, Kui...
IEEE Transactions on Dependable and Secure Computing.  17 (2020)  4 - p. 745-759 , 2020
 
?
7

Catch Me If You Can: Rogue Access Point Detection Using Int..:

Jang, Rhongho ; Kang, Jeonil ; Mohaisen, Aziz.
IEEE Transactions on Mobile Computing.  19 (2020)  5 - p. 1056-1071 , 2020
 
?
8

Examining the Robustness of Learning-Based DDoS Detection i..:

, In: 2019 IEEE Conference on Dependable and Secure Computing (DSC),
 
?
9

RouteChain: Towards Blockchain-based Secure and Efficient B..:

, In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC),
Saad, Muhammad ; Anwar, Afsah ; Ahmad, Ashar... - p. 210-218 , 2019
 
?
10

Analyzing endpoints in the internet of things malware : ..:

, In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks,
Choi, Jinchun ; Anwar, Afsah ; Alasmary, Hisham... - p. 288-289 , 2019
 
?
11

Security and Privacy in Communication Networks: 15th EAI In.. 

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 305
Chen, Songqing ; Choo, Kim-Kwang Raymond ; Fu, Xinwen.. - 1st ed. 2019 . , 2019
 
?
12

Breaking graph-based IoT malware detection systems using ad..:

, In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
13

A cost-effective anomaly detection system using in-DRAM wor..:

, In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks,
Jang, Rhongho ; Moon, Seongkwang ; Noh, Youngtae.. - p. 286-287 , 2019
 
?
 
1-15