The methodology for evaluating response cost for intrusion response systems

Chris Strasburg , Natalia Stakhanova , Samik Basu , Johnny S Wong
Computer Science Technical Reports 199

20
2008
The impact of application-layer denial-of-service attacks

Hugo Gonzalez , Marc Antoine Gosselin-Lavigne , Natalia Stakhanova , Ali A Ghorbani
Case Studies in Secure Computing: Achievements and Trends 261

19
2014
An empirical analysis of android banking malware

Andi Fitriah A Kadir , Natalia Stakhanova , Ali A Ghorbani
Auerbach Publications 223 -246

16
2016
Graph structures for event matching

Natalia Stakhanova , Ali-akbar Ghorbani , William Bird

1
2016
System and method for simulating network attacks

Aliakbar Ghorbani , Iosif Viorel Onut , Natalia Stakhanova , William Bird

2012
An Online Adaptive Approach to Alert Correlation

Ali Ghorbani , Hanli Ren , Natalia Stakhanova
DIMVA 2010, July 8-9, 2010, Paris, France

2010
Data provenance in security and privacy

Bofeng Pan , Natalia Stakhanova , Suprio Ray
ACM Computing Surveys 55 ( 14s) 1 -35

11
2023
EtherProv: Provenance-aware detection, analysis, and mitigation of Ethereum smart contract security issues

Shlomi Linoy , Suprio Ray , Natalia Stakhanova
2021 IEEE International Conference on Blockchain (Blockchain) 1 -10

11
2021
Origin attribution of RSA public keys

Enrico Branca , Farzaneh Abazari , Ronald Rivera Carranza , Natalia Stakhanova
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I 17 374 -396

4
2021
An exploratory study on the relationship of smells and design issues with software vulnerabilities

Sahrima Jannat Oishwee , Zadia Codabux , Natalia Stakhanova
16 -20

2
2022
Androclonium: Bytecode-level code clone detection for obfuscated android apps

Ardalan Foroughipour , Natalia Stakhanova , Farzaneh Abazari , Bahman Sistany
Springer International Publishing 379 -397

2
2022
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing.

Animesh Kar , Andrei Natadze , Enrico Branca , Natalia Stakhanova
SECRYPT 261 -271

2
2022
A Multilevel Secure Relational Database Model with key-polyinstantiation (MLS-K)

Natalia Stakhanova , Ruchi Dhingra
Technical Report 06-12, Department of Computer Science, Iowa State University

2
2002
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum

Bofeng Pan , Natalia Stakhanova , Zhongwen Zhu
ACM Transactions on Internet Technology 21 ( 1) 1 -30

1
2024
Detecting Overlay Attacks in Android

Animesh Kar , Natalia Stakhanova , Enrico Branca
Procedia Computer Science 231 137 -144

1
2024
Exploiting Android Browser

Animesh Kar , Natalia Stakhanova
Springer Nature Singapore 162 -185

1
2023
Language and platform independent attribution of heterogeneous code

Farzaneh Abazari , Enrico Branca , Evgeniya Novikova , Natalia Stakhanova
Springer Nature Switzerland 173 -191

1
2022
Measuring and Characterizing (mis) compliance of the Android permission system

Anna Barzolevskaia , Enrico Branca , Natalia Stakhanova
IEEE Transactions on Software Engineering

2024
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study

Norah Ridley , Enrico Branca , Jadyn Kimber , Natalia Stakhanova
Springer Nature Switzerland 233 -249

2023