Sign in
Ali Zand
Publication Activity (10 Years)
Years Active: 2011-2020
Publications (10 Years): 8
Top Topics
Sina Weibo
Leak Detection
Spam E Mail
Command And Control
Top Venues
CCS
NDSS
SEGS@CCS
CoRR
</>
Publications
</>
Camelia Simoiu
,
Ali Zand
,
Kurt Thomas
,
Elie Bursztein
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Internet Measurement Conference
(2020)
Adam Oest
,
Penghui Zhang
,
Brad Wardman
,
Eric Nunes
,
Jakub Burgis
,
Ali Zand
,
Kurt Thomas
,
Adam Doupé
,
Gail-Joon Ahn
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
USENIX Security Symposium
(2020)
Shirin Nilizadeh
,
Francois Labreche
,
Alireza Sedighian
,
Ali Zand
,
José M. Fernandez
,
Christopher Kruegel
,
Gianluca Stringhini
,
Giovanni Vigna
POISED: Spotting Twitter Spam Off the Beaten Paths.
CoRR
(2017)
Andrea Continella
,
Yanick Fratantonio
,
Martina Lindorfer
,
Alessandro Puccetti
,
Ali Zand
,
Christopher Kruegel
,
Giovanni Vigna
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
NDSS
(2017)
Shirin Nilizadeh
,
Francois Labreche
,
Alireza Sedighian
,
Ali Zand
,
José M. Fernandez
,
Christopher Kruegel
,
Gianluca Stringhini
,
Giovanni Vigna
POISED: Spotting Twitter Spam Off the Beaten Paths.
CCS
(2017)
Ali Zand
,
Gaspar Modelo-Howard
,
Alok Tongaonkar
,
Sung-Ju Lee
,
Christopher Kruegel
,
Giovanni Vigna
Demystifying DDoS as a Service.
IEEE Commun. Mag.
55 (7) (2017)
Kurt Thomas
,
Frank Li
,
Ali Zand
,
Jacob Barrett
,
Juri Ranieri
,
Luca Invernizzi
,
Yarik Markov
,
Oxana Comanescu
,
Vijay Eranti
,
Angelika Moscicki
,
Daniel Margolis
,
Vern Paxson
,
Elie Bursztein
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
CCS
(2017)
Ali Zand
,
Amir Houmansadr
,
Giovanni Vigna
,
Richard A. Kemmerer
,
Christopher Kruegel
Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
ACSAC
(2015)
Maria B. Line
,
Ali Zand
,
Gianluca Stringhini
,
Richard A. Kemmerer
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
SEGS@CCS
(2014)
Ali Zand
,
Giovanni Vigna
,
Xifeng Yan
,
Christopher Kruegel
Extracting probable command and control signatures for detecting botnets.
SAC
(2014)
Ali Zand
,
Giovanni Vigna
,
Richard A. Kemmerer
,
Christopher Kruegel
Rippler: Delay injection for service dependency detection.
INFOCOM
(2014)
Casey Cipriano
,
Ali Zand
,
Amir Houmansadr
,
Christopher Kruegel
,
Giovanni Vigna
Nexat: a history-based approach to predict attacker actions.
ACSAC
(2011)
Adam Doupé
,
Manuel Egele
,
Benjamin Caillat
,
Gianluca Stringhini
,
Gorkem Yakin
,
Ali Zand
,
Ludovico Cavedon
,
Giovanni Vigna
Hit 'em where it hurts: a live security exercise on cyber situational awareness.
ACSAC
(2011)