Sumayah Alrwais
Sumayah Alrwais
Assistant Professor at King Saud University, Saudi Arabia
Verified email at ksu.edu.sa
Title
Cited by
Cited by
Year
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1102015
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
O Alina, L Zhou, YT Fang, CH Sang, A Sumayah
Proceedings of the International Conference on Dependable Systems and …, 2015
110*2015
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures
Z Li, S Alrwais, Y Xie, F Yu, XF Wang
2013 IEEE Symposium on Security and Privacy, 112-126, 2013
1082013
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014
522014
Dissecting ghost clicks: Ad fraud via misdirected human clicks
SA Alrwais, A Gerber, CW Dunn, O Spatscheck, M Gupta, E Osterweil
Proceedings of the 28th Annual Computer Security Applications Conference, 21-30, 2012
442012
Hunting the red fox online: Understanding and detection of mass redirect-script injections
Z Li, S Alrwais, XF Wang, E Alowaisheq
2014 IEEE Symposium on Security and Privacy, 3-18, 2014
402014
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, X Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
282017
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
222016
Resident Evil: Understanding Residential IP Proxy as a Dark Service
X Mi, Y Liu, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun
Resident Evil: Understanding Residential IP Proxy as a Dark Service, 0, 2019
192019
A context-aware access control model for pervasive environments
S Al-Rwais, J Al-Muhtadi
IETE Technical Review 27 (5), 371-379, 2010
142010
Access control using threshold cryptography for ubiquitous computing environments
J Al-Muhtadi, R Hill, S Al-Rwais
Journal of King Saud University-Computer and Information Sciences 23 (2), 71-78, 2011
122011
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
E Alowaisheq, P Wang, S Alrwais, X Liao, XF Wang, T Alowaisheq, X Mi, ...
NDSS Symposium, 2019
102019
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
102016
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
92016
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
A Noroozian, J Koenders, E van Veldhuizen, CH Ganan, S Alrwais, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1341-1356, 2019
32019
Detecting malicious websites
A Oprea, S Alrwais, KD Bowers, TS Leetham, Z Li, RL Rivest
US Patent 9,621,576, 2017
12017
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, XF Wang, S Hao, Y Jia, ...
4th IEEE European Symposium on Security and Privacy (EuroS&P 2019), 2019
2019
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1 (1), 14, 2018
2018
Behind the scenes of IaaSimplementations
S Alrwais
Indiana, 0
The system can't perform the operation now. Try again later.
Articles 1–19