SELECTED REFEREED PUBLICATIONS
- F. Jahanian, “The Policy Infrastructure for Big Data: From Data to Knowledge to Action,” Journal of Law and Policy for Information Society, vol. 10, no. 3, Winter 2015.
- Y. Xu, M. Bailey, B. Noble and F. Jahanian, “Small is Better: Avoiding Latency Traps in Virtualized Data Centers,” Proceedings of the 2013 ACM Symposium on Cloud Computing (SoCC'13) Santa Clara, CA, USA, Oct. 2013.
- J. Zhang, R. Berthier, W. Rhee, M. Bailey, P. Pal, F. Jahanian, and W. Sanders, “Learning from Early Attempts to Measure Information Security Performance,” Proceeding of the 5th Workshop on Cyber Security Experimentation and Test (CSET '12), Bellevue, Washington, Aug. 2012.
- J. Zhang, R. Berthier, W. Rhee, M. Bailey, P. Pal, F. Jahanian, and W. Sanders, “Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System,” Proceedings of the 42nd Annual IEEE International Conference on Dependable Systems and Networks (DSN '12), Boston, MA, June 2012.
- Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M.Hiltunen, and R. Schlichting, “An Exploration of L2 Cache Covert Channels in Virtualized Environments,” Proceedings of the 3rd ACM Cloud Computing Security Workshop (CCSW '11), Chicago, Illinois, Oct. 2011.
- K. Nyalkalkar, S. Sinha, M. Bailey, and F. Jahanian, “A Comparative Study of Two Network-based Anomaly Detection Methods,” In (mini-conference) the 30th IEEE International Conference on Computer Communications (INFOCOM '11), Shanghai, China, Apr. 2011.
- E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Houston, “Internet Background Radiation Revisited,” ACM/USENIX Internet Measurement Conference, Melbourne, Australia, Nov. 2010.
- C. Labovitz, S. Ikle-Johnson, D. McPherson, J. Oberheide and F. Jahanian, “Internet Inter-Domain Traffic,” Proceedings of ACM SIGCOMM, August 2010.
- Y. Xu, M. Bailey and F. Jahanian, “CANVuS: Context-Aware Network Vulnerability Scanning,”13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, CA, Sept. 2010.
- S. Sinha, M. Bailey, and F. Jahanian, “Improving SPAM Blacklisting through Dynamic Thresholding and Speculative Aggregation,” 17th Annual Network & Distributed System Security Symposium (NDSS'10), San Diego, CA, Mar. 2010.
- J. Oberheide and F. Jahanian, “When Mobile is Harder Than Fixed: Demystifying Security Challenges in Mobile Environments,” Eleventh Workshop on Mobile Computing Systems and Applications (HotMobile), Annapolis, MD, Feb. 2010.
- J. Oberheide, M. Bailey, and F. Jahanian. “PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion,” 3rd USENIX Workshop on Offensive Technologies (WOOT '09), Montreal, Canada, Aug. 2009.
- J. Oberheide, E. Cooke, and F. Jahanian, “If It Ain't Broke, Don't Fix It: Challenges and New Directions for Inferring the Impact of Software Patches,” Workshop on Hot Topics in Operating Systems (HotOS XII), May 2009.
- S. Sinha, M. Bailey, and F. Jahanian, “One Size Does Not Fit All: 10 Years of Applying Context Aware Security,” Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (HST '09), Waltham, MA, May 2009.
- M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M.h Karir. “A Survey of Botnet Technology and Defenses,” Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH '09), Washington, DC, Mar. 2009.
- J. Oberheide, E. Cooke, and F. Jahanian, “CloudAV: N-Version Antivirus in the Network Cloud,” Proceedings of the 17th USENIX Security Symposium, July 2008.
- J. Oberheide, K.Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, “Virtualized In-Cloud Security Services for Mobile Devices,” Workshop on Virtualization in Mobile Computing (MobiVirt'08), June 2008.
- S. Sinha, M. Bailey, and F. Jahanian. “Shades of Grey: On the Effectiveness of Reputation-based blacklists,” Proceedings of the 3rd International Conference on Malicious and Unwanted Software (MALWARE '08), pages 57-64, Fairfax, Virginia, USA, Oct. 2008.
- J. Oberheide, E. Cooke, and F. Jahanian, “Exploiting Live Virtual Machine Migration,” Black Hat DC, Washington DC, Feb. 2008.
- M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, “Automated Classification and Analysis of Internet Malware,” 10th International Symposium Recent Advances in Intrusion Detection (RAID), Queensland, Australia, Sept. 2007.
- J. Oberheide, E. Cooke, and F. Jahanian, “Rethinking Antivirus: Executable Analysis in the Network Cloud,” 2nd USENIX Workshop on Hot Topics in Security (HotSec), Boston, MA, Aug. 2007.
- J. Oberheide, M. Karir, Z. M. Mao and F. Jahanian, “Characterizing Dark DNS Behavior,” Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'07),” Switzerland, July 2007.
- S. Sinha, M. Bailey, and F. Jahanian, “Shedding Light on the Configuration of Dark Addresses,” Network and Distributed System Security Symposium (NDSS), San Diego, California, Feb. 28-Mar. 2, 2007.
- E. Cooke, A. Myrick, D. Rusek, and F. Jahanian, “Resource-Aware Multi-Format Network Security Data Storage,” Proceedings of the SIGCOMM Workshop on Large Scale Attack Defense (LSAD'06), Sept. 2006.
- S. Sinha, F. Jahanian, and J. Patel, “WIND: Workload-aware Intrusion Detection,” 9th International Symposium on Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, Sept. 2006.
- E. Cooke, Z. M. Mao, and F. Jahanian, “Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware,” International Conference on Dependable Systems and Networks (DSN 2006), Philadelphia, PA, pp. 179-188, June 2006.
- J. Han, D. Watson, F. Jahanian, “An Experimental Study of Internet Path Diversity,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 273-288, Oct-Dec, 2006.
- E. Cooke, M. Bailey, F. Jahanian, and R. Mortier, "The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery," 3rd Symposium on Networked Systems Design and Implementation (NSDI06), San Jose, CA, May 2006.
- M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha, “Practical Darknet Measurement,” Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '06), pages 1496-1501, Princeton, New Jersey, Mar. 2006.
For a complete list of publications, please consult my Curriculum Vitae
|