Learn to detect phishing scams using learning and ensemble? methods A Saberi, M Vahidi, BM Bidgoli 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2007 | 73 | 2007 |
Hybrid-bridge: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization A Saberi, Y Fu, Z Lin Proceedings of the 21st annual network and distributed system security …, 2014 | 59 | 2014 |
A zero knowledge password proof mutual authentication technique against real-time phishing attacks M Sharifi, A Saberi, M Vahidi, M Zorufi Information Systems Security: Third International Conference, ICISS 2007 …, 2007 | 21 | 2007 |
Large-scale, automatic xss detection using google dorks R Pelizzi, T Tran, A Saberi Stony Brook University, Department of Computer Science. URL: http://www3. cs …, 2011 | 8 | 2011 |
How to counter control flow tampering attacks M Sharifi, M Zoroufi, A Saberi 2007 IEEE/ACS International Conference on Computer Systems and Applications …, 2007 | 4 | 2007 |
VMM detection using privilege rings and benchmark execution times M Sharifi, H Salimi, A Saberi, J Gharibshah International Journal of Communication Networks and Distributed Systems 11 …, 2013 | 2 | 2013 |
SHABaN multi-agent team to herd cows AT Rahmani, A Saberi, M Mohammadi, A Nikanjam, EA Mosabbeb, ... Programming Multi-Agent Systems: 6th International Workshop, ProMAS 2008 …, 2009 | 2 | 2009 |
Using Type Inference and Abstract Interpretation for Static Binary Analysis A Saberi The Graduate School, Stony Brook University: Stony Brook, NY., 2012 | | 2012 |