


Остановите войну!
for scientists:
Natalia Stakhanova
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j12]Ghazale Amel Zendehdel
, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova
, Erik J. Scheme:
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices. ACM Trans. Internet Techn. 22(1): 14:1-14:31 (2022) - [c36]Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany:
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps. SEC 2022: 379-397 - [c35]Animesh Kar, Andrei Natadze, Enrico Branca, Natalia Stakhanova:
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing. SECRYPT 2022: 261-271 - 2021
- [j11]Shlomi Linoy
, Natalia Stakhanova, Suprio Ray:
De-anonymizing Ethereum blockchain smart contracts through code attribution. Int. J. Netw. Manag. 31(1) (2021) - [c34]Shlomi Linoy, Suprio Ray, Natalia Stakhanova:
EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues. Blockchain 2021: 1-10 - [c33]Enrico Branca, Farzaneh Abazari
, Ronald Rivera Carranza, Natalia Stakhanova:
Origin Attribution of RSA Public Keys. SecureComm (1) 2021: 374-396 - 2020
- [c32]Shlomi Linoy, Suprio Ray, Natalia Stakhanova:
Towards Eidetic Blockchain Systems with Enhanced Provenance. ICDE Workshops 2020: 7-10
2010 – 2019
- 2019
- [j10]Vaibhavi Kalgutkar, Ratinder Kaur
, Hugo Gonzalez, Natalia Stakhanova, Alina Matyukhina:
Code Authorship Attribution: Methods and Challenges. ACM Comput. Surv. 52(1): 3:1-3:36 (2019) - [c31]Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova:
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. ARES 2019: 17:1-17:10 - [c30]Shlomi Linoy, Hassan Mahdikhani, Suprio Ray, Rongxing Lu, Natalia Stakhanova, Ali A. Ghorbani:
Scalable Privacy-Preserving Query Processing over Ethereum Blockchain. Blockchain 2019: 398-404 - [c29]Shlomi Linoy, Natalia Stakhanova, Alina Matyukhina:
Exploring Ethereum's Blockchain Anonymity Using Smart Contract Code Attribution. CNSM 2019: 1-9 - [c28]Alina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley:
Adversarial Authorship Attribution in Open-Source Projects. CODASPY 2019: 291-302 - 2018
- [j9]Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali A. Ghorbani:
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges. J. Cyber Secur. Mobil. 7(3): 1-52 (2018) - [c27]Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina:
Android authorship attribution through string analysis. ARES 2018: 4:1-4:10 - [c26]Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Authorship Attribution of Android Apps. CODASPY 2018: 277-286 - [c25]Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova:
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps. COMPSAC (2) 2018: 492-497 - [c24]Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova:
Unmasking Android Obfuscation Tools Using Spatial Analysis. PST 2018: 1-10 - [e4]Jeffrey Todd McDonald, Sébastien Bardin, Natalia Stakhanova:
Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018. ACM 2018, ISBN 978-1-4503-6096-8 [contents] - 2017
- [j8]Hossein Hadian Jazi, Hugo Gonzalez
, Natalia Stakhanova, Ali A. Ghorbani:
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Networks 121: 25-36 (2017) - 2016
- [c23]Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari
, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. NSS 2016: 467-482 - [c22]Hugo Gonzalez
, Natalia Stakhanova, Ali A. Ghorbani:
Measuring code reuse in Android apps. PST 2016: 187-195 - [e3]Mila Dalla Preda, Natalia Stakhanova, Jeffrey Todd McDonald:
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016. ACM 2016, ISBN 978-1-4503-4841-6 [contents] - 2015
- [j7]Georgios Mantas
, Natalia Stakhanova, Hugo Gonzalez
, Hossein Hadian Jazi, Ali A. Ghorbani:
Application-layer denial of service attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2/3/4): 216-239 (2015) - [c21]Marc Antoine Gosselin-Lavigne, Hugo Gonzalez
, Natalia Stakhanova, Ali A. Ghorbani:
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters. ARES 2015: 516-521 - [c20]Ashutosh Jain, Hugo Gonzalez
, Natalia Stakhanova:
Enriching reverse engineering through visual exploration of Android binaries. PPREW@ACSAC 2015: 9:1-9:9 - [c19]Hugo Gonzalez
, Andi A. Kadir, Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani:
Exploring reverse engineering symptoms in Android apps. EUROSEC 2015: 7:1-7:7 - [c18]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova:
An Entropy Based Encrypted Traffic Classifier. ICICS 2015: 282-294 - [c17]Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani:
Android Botnets: What URLs are Telling Us. NSS 2015: 78-91 - [e2]Jeffrey Todd McDonald, Mila Dalla Preda, Natalia Stakhanova:
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015. ACM 2015, ISBN 978-1-4503-3642-0 [contents] - 2014
- [c16]Joshua Cazalas, Jeffrey Todd McDonald, Todd R. Andel, Natalia Stakhanova:
Probing the Limits of Virtualized Software Protection. PPREW@ACSAC 2014: 5:1-5:11 - [c15]Elaheh Biglar Beigi Samani, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani:
Towards effective feature selection in machine learning-based botnet detection approaches. CNS 2014: 247-255 - [c14]Hugo Gonzalez
, Natalia Stakhanova, Ali A. Ghorbani:
DroidKin: Lightweight Detection of Android Apps Similarity. SecureComm (1) 2014: 436-453 - 2013
- [j6]Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia:
Detecting machine-morphed malware variants via engine attribution. J. Comput. Virol. Hacking Tech. 9(3): 137-157 (2013) - [e1]Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang:
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5839-2 [contents] - 2012
- [j5]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
Towards cost-sensitive assessment of intrusion response selection. J. Comput. Secur. 20(2-3): 169-198 (2012) - 2011
- [c13]Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani:
Exploring network-based malware classification. MALWARE 2011: 14-20 - 2010
- [j4]Natalia Stakhanova, Samik Basu, Johnny Wong:
On the symbiosis of specification-based and anomaly-based detection. Comput. Secur. 29(2): 253-268 (2010) - [j3]Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorbani:
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods. IEEE Trans. Syst. Man Cybern. Part C 40(5): 516-524 (2010) - [c12]Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani:
An Online Adaptive Approach to Alert Correlation. DIMVA 2010: 153-172 - [c11]Natalia Stakhanova, Ali A. Ghorbani:
Managing intrusion detection rule sets. EUROSEC 2010: 29-35 - [c10]Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani:
Selective Regular Expression Matching. ISC 2010: 226-240
2000 – 2009
- 2009
- [c9]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
Intrusion response cost assessment methodology. AsiaCCS 2009: 388-391 - [c8]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. COMPSAC (1) 2009: 355-360 - 2008
- [c7]Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. ARES 2008: 88-95 - [c6]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
On Evaluation of Response Cost for Intrusion Response Systems. RAID 2008: 390-391 - 2007
- [j2]Guy G. Helmer, Johnny Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova:
Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems. Int. J. Inf. Comput. Secur. 1(1/2): 109-142 (2007) - [j1]Natalia Stakhanova, Samik Basu, Johnny Wong:
A taxonomy of intrusion response systems. Int. J. Inf. Comput. Secur. 1(1/2): 169-184 (2007) - [c5]Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:
Specification Synthesis for Monitoring and Analysis of MANET Protocols. AINA Workshops (1) 2007: 183-187 - [c4]Natalia Stakhanova, Samik Basu, Johnny Wong:
A Cost-Sensitive Model for Preemptive Intrusion Response Systems. AINA 2007: 428-435 - 2006
- [c3]Natalia Stakhanova, Samik Basu, Robyn R. Lutz
, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. DASC 2006: 333-340 - 2005
- [c2]Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov:
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. ICDCS Workshops 2005: 203-209 - 2004
- [c1]Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong, Ying Cai:
A Reputation-based Trust Management in Peer-to-Peer Network Systems. PDCS 2004: 510-515
Coauthor Index
aka: Ali Akbar Ghorbani

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-08-05 21:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint