Conference PolyPack: An automated online packing service for optimal antivirus evasion 2009 • 3rd USENIX Workshop on Offensive Technologies, WOOT 2009 Oberheide J, Bailey M, Jahanian F
Conference PolyPack: An automated online packing service for optimal antivirus evasion 2009 • 3rd USENIX Workshop on Offensive Technologies, WOOT 2009 Oberheide J, Bailey M, Jahanian F
Conference CloudAV: N-version antivirus in the network cloud 2008 • Proceedings of the 17th USENIX Security Symposium • 91-106 Oberheide J, Cooke E, Jahanian F
Journal Article Enhancing end-to-end availability and performance via topology-aware overlay networks 2008 • Computer Networks • 52(16):3029-3046 Han J, Watson D, Jahanian F
Conference Shades of Grey: On the effectiveness of reputation-based “blacklists” 2008 57-64 Sinha S, Bailey M, Jahanian F
Conference Virtualized in-cloud security services for mobile devices 2008 31-35 Oberheide J, Veeraraghavan K, Cooke E, Flinn J, Jahanian F
Conference Automated Classification and Analysis of Internet Malware 2007 • Lecture Notes in Computer Science • 4637:178-197 Bailey M, Oberheide J, Andersen J, Mao ZM, Jahanian F, Nazario J
Conference Rethinking antivirus: Executable analysis in the network cloud 2007 • 2nd USENIX Workshop on Hot Topics in Security, HotSec 2007 Oberheide J, Cooke E, Jahanian F
Conference Shedding Light on the Configuration of Dark Addresses 2007 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 Sinha S, Bailey M, Jahanian F
Conference Student Forum 2007 • Proceedings of the International Conference on Dependable Systems and Networks • 811-811 Jahanian F
Journal Article An Experimental Study of Internet Path Diversity 2006 • IEEE Transactions on Dependable and Secure Computing • 3(4):273-288 Han J, Watson D, Jahanian F
Conference Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware 2006 • Proceedings of the International Conference on Dependable Systems and Networks • 179-188 Cooke E, Mao ZM, Jahanian F
Conference Practical Darknet Measurement 2006 1496-1501 Bailey M, Cooke E, Jahanian F, Myrick A, Sinha S
Conference Resource-aware multi-format network security data storage 2006 177-184 Cooke E, Myrick A, Rusek D, Jahanian F
Conference The dark oracle: Perspective-aware unused and unreachable address discovery 2006 • 3rd Symposium on Networked Systems Design and Implementation, NSDI 2006 Cooke E, Bailey M, Jahanian F, Mortier R
Conference WIND: Workload-Aware INtrusion Detection 2006 • Lecture Notes in Computer Science • 4219:290-310 Sinha S, Jahanian F, Patel JM
Conference Data reduction for the scalable automated analysis of distributed darknet traffic 2005 1 Bailey M, Cooke E, Jahanian F, Provos N, Rosaen K, Watson D
Conference Data reduction for the scalable automated analysis of distributed darknet traffic 2005 • Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC • 239-252 Bailey M, Cooke E, Jahanian F, Provos N, Rosaen K, Watson D
Journal Article The Blaster worm: then and now 2005 • IEEE Security and Privacy • 3(4):26-31 Bailey M, Cooke E, Jahanian F, Watson D, Nazario J
Conference The Internet Motion Sensor: A Distributed Blackhole Monitoring System 2005 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005 Bailey M, Cooke E, Jahanian F, Nazario J, Watson D
Conference The zombie roundup: Understanding, detecting, and disrupting botnets 2005 • Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005 • 39-44 Cooke E, Jahanian F, McPherson D
Conference Topology Aware Overlay Networks 2005 • IEEE Infocom. Proceedings • 4:2554-2565 Han J, Watson D, Jahanian F
Journal Article An extensible probe architecture for network protocol performance measurement 2004 • Software - Practice and Experience • 34(1):47-67 Watson D, Malan GR, Jahanian F
Conference Impact of path diversity on multi-homed and overlay networks 2004 • Proceedings of the International Conference on Dependable Systems and Networks • 29-38 Han J, Jahanian F