​
Login / Signup
Afsah Anwar
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 37
Top Topics
Comprehensive Analysis
Minimal Paths
Computer Networks
Quality Assessment
Top Venues
CoRR
Comput. Networks
ICDCS
WiSec
</>
Publications
</>
Muhammad Saad
,
Afsah Anwar
,
Srivatsan Ravi
,
David Mohaisen
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw.
32 (1) (2024)
Hisham Alasmary
,
Afsah Anwar
,
Ahmed Abusnaina
,
Abdulrahman Alabduljabbar
,
Mohammed Abuhamad
,
An Wang
,
Daehun Nyang
,
Amro Awad
,
David Mohaisen
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J.
9 (4) (2022)
Ahmed Abusnaina
,
Afsah Anwar
,
Sultan Alshamrani
,
Abdulrahman Alabduljabbar
,
RhongHo Jang
,
DaeHun Nyang
,
David Mohaisen
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
RAID
(2022)
Ahmed Abusnaina
,
Mohammed Abuhamad
,
Hisham Alasmary
,
Afsah Anwar
,
Rhongho Jang
,
Saeed Salem
,
DaeHun Nyang
,
David Mohaisen
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Muhammad Saad
,
Afsah Anwar
,
Ashar Ahmad
,
Hisham Alasmary
,
Murat Yuksel
,
David Mohaisen
: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks
217 (2022)
Afsah Anwar
,
Yi Hui Chen
,
Roy Hodgman
,
Tom Sellers
,
Engin Kirda
,
Alina Oprea
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
ACSAC
(2022)
Jinchun Choi
,
Afsah Anwar
,
Abdulrahman Alabduljabbar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
An Wang
,
Songqing Chen
,
DaeHun Nyang
,
Amro Awad
,
David Mohaisen
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks
206 (2022)
Afsah Anwar
,
Ahmed Abusnaina
,
Songqing Chen
,
Frank Li
,
David Mohaisen
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Muhammad Saad
,
Afsah Anwar
,
Srivatsan Ravi
,
David Mohaisen
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality.
IACR Cryptol. ePrint Arch.
2021 (2021)
Hisham Alasmary
,
Afsah Anwar
,
Ahmed Abusnaina
,
Abdulrahman Alabduljabbar
,
Mohammad Abuhamad
,
An Wang
,
DaeHun Nyang
,
Amro Awad
,
David Mohaisen
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR
(2021)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
Muhammad Saad
,
David Mohaisen
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks
188 (2021)
Ahmed Abusnaina
,
Afsah Anwar
,
Sultan Alshamrani
,
Abdulrahman Alabduljabbar
,
Rhongho Jang
,
DaeHun Nyang
,
David Mohaisen
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
DSN (Supplements)
(2021)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
Muhammad Saad
,
David Mohaisen
Domain name system security and privacy: A contemporary survey.
Comput. Networks
185 (2021)
Afsah Anwar
,
Jinchun Choi
,
Abdulrahman Alabduljabbar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
An Wang
,
Songqing Chen
,
DaeHun Nyang
,
Amro Awad
,
David Mohaisen
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts.
CoRR
(2021)
Muhammad Saad
,
Afsah Anwar
,
Srivatsan Ravi
,
David Mohaisen
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
CCS
(2021)
Ahmed Abusnaina
,
Afsah Anwar
,
Sultan Alshamrani
,
Abdulrahman Alabduljabbar
,
RhongHo Jang
,
Daehun Nyang
,
David Mohaisen
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR
(2021)
Afsah Anwar
,
Ahmed Abusnaina
,
Songqing Chen
,
Frank Li
,
David Mohaisen
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
DSN (Supplements)
(2021)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
David Mohaisen
Domain Name System Security and Privacy: A Contemporary Survey.
CoRR
(2020)
Ahmed Abusnaina
,
Mohammed Abuhamad
,
Hisham Alasmary
,
Afsah Anwar
,
Rhongho Jang
,
Saeed Salem
,
DaeHun Nyang
,
David Mohaisen
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR
(2020)
Hisham Alasmary
,
Ahmed Abusnaina
,
Rhongho Jang
,
Mohammed Abuhamad
,
Afsah Anwar
,
DaeHun Nyang
,
David Mohaisen
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
ICDCS
(2020)
Jinchun Choi
,
Mohammed Abuhamad
,
Ahmed Abusnaina
,
Afsah Anwar
,
Sultan Alshamrani
,
Jeman Park
,
Daehun Nyang
,
David Mohaisen
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access
8 (2020)
Afsah Anwar
,
Ahmed Abusnaina
,
Songqing Chen
,
Frank Li
,
David Mohaisen
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
CoRR
(2020)
Afsah Anwar
,
Aminollah Khormali
,
Jinchun Choi
,
Hisham Alasmary
,
Saeed Salem
,
DaeHun Nyang
,
David Mohaisen
Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety
7 (23) (2020)
Afsah Anwar
,
Hisham Alasmary
,
Jeman Park
,
An Wang
,
Songqing Chen
,
David Mohaisen
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
ICICS
(2020)
Jinchun Choi
,
Afsah Anwar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
DaeHun Nyang
,
Aziz Mohaisen
IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
SEC
(2019)
Hisham Alasmary
,
Aminollah Khormali
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR
(2019)
Jinchun Choi
,
Ahmed Abusnaina
,
Afsah Anwar
,
An Wang
,
Songqing Chen
,
DaeHun Nyang
,
Aziz Mohaisen
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
DSC
(2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
WiSec
(2019)
Hisham Alasmary
,
Aminollah Khormali
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
Ahmed Abusnaina
,
Amro Awad
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J.
6 (5) (2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Aziz Mohaisen
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
ICDCS
(2019)
Jinchun Choi
,
Afsah Anwar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing endpoints in the internet of things malware: poster.
WiSec
(2019)
Muhammad Saad
,
Afsah Anwar
,
Ashar Ahmad
,
Hisham Alasmary
,
Murat Yuksel
,
Aziz Mohaisen
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
IEEE ICBC
(2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR
(2019)
Jinchun Choi
,
Afsah Anwar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing Endpoints in the Internet of Things Malware.
CoRR
(2019)
Afsah Anwar
,
Aminollah Khormali
,
DaeHun Nyang
,
Aziz Mohaisen
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
SecureComm (1)
(2018)
Hisham Alasmary
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
DaeHun Nyang
,
Aziz Mohaisen
Graph-Based Comparison of IoT and Android Malware.
CSoNet
(2018)
Afsah Anwar
,
Aminollah Khormali
,
Aziz Mohaisen
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
AsiaCCS
(2018)