default search action
Iosif-Viorel Onut
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c42]Julien Cassagne, Ettore Merlo, Paula Branco, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Unsupervised Graph Neural Networks for Source Code Similarity Detection. DS 2023: 535-549 - [c41]Emad Badawi, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Web Scams Detection System. FPS (1) 2023: 174-188 - [c40]Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. FPS (1) 2023: 321-338 - [e7]Paria Shirani, Iosif-Viorel Onut, Paula Branco:
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, CASCON 2023, Las Vegas, NV, USA, September 11-14, 2023. ACM 2023 [contents] - 2022
- [c39]Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Phishing Kits Source Code Similarity Distribution: A Case Study. SANER 2022: 983-994 - [e6]Paria Shirani, Iosif-Viorel Onut, Tinny Ng:
Proceedings of the 32nd Annual International Conference on Computer Science and Software Engineering, CASCON 2022, Toronto, Ontario, Canada, November 15-17, 2022. ACM 2022 [contents] - 2021
- [c38]Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:
Proactive Detection of Phishing Kit Traffic. ACNS (2) 2021: 257-286 - [e5]Vio Onut, Farhana H. Zulkernine:
CASCON '21: Proceedings of the 31st Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 22 - 25, 2021. ACM 2021 [contents] - 2020
- [c37]Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:
SemanticPhish: A Semantic-based Scanning System for Early Detection of Phishing Attacks. eCrime 2020: 1-12 - [c36]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
An Automatic Detection and Analysis of the Bitcoin Generator Scam. EuroS&P Workshops 2020: 407-416 - [e4]Lily Shaddick, Guy-Vincent Jourdan, Vio Onut, Tinny Ng:
CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10 - 13, 2020. ACM 2020 [contents]
2010 – 2019
- 2019
- [j8]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
Automatic Detection and Analysis of the "Game Hack" Scam. J. Web Eng. 18(8): 729-760 (2019) - [c35]Sophie Le Page, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
Domain Classifier: Compromised Machines Versus Malicious Registrations. ICWE 2019: 265-279 - [c34]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
The "Game Hack" Scam. ICWE 2019: 280-295 - 2018
- [j7]Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Russell Couturier, Iosif-Viorel Onut:
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces. J. Internet Serv. Appl. 9(1): 9:1-9:27 (2018) - [c33]Nasim Beigi Mohammadi, Marin Litoiu, Mahsa Emami-Taba, Ladan Tahvildari, Marios Fokaefs, Ettore Merlo, Iosif-Viorel Onut:
A DevOps framework for quality-driven self-protection in web software systems. CASCON 2018: 270-274 - [c32]Sophie Le Page, Guy-Vincent Jourdan, Gregor von Bochmann, Jason Flood, Iosif-Viorel Onut:
Using URL shorteners to compare phishing and malware attacks. eCrime 2018: 1-13 - [c31]Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
Phishing Attacks Modifications and Evolutions. ESORICS (1) 2018: 243-262 - [c30]Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Using AP-TED to Detect Phishing Attack Variations. PST 2018: 1-6 - [e3]Iosif-Viorel Onut, Andrew Jaramillo, Guy-Vincent Jourdan, Dorina C. Petriu, Wang Chen:
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, CASCON 2018, Markham, Ontario, Canada, October 29-31, 2018. ACM 2018 [contents] - 2017
- [j6]Abhimanyu Panwar, Iosif-Viorel Onut, Michael Smith, James Miller:
On the Concept of Automatic User Behavior Profiling of Websites. Int. J. Syst. Serv. Oriented Eng. 7(1): 1-20 (2017) - [j5]James Miller, Abhimanyu Panwar, Iosif-Viorel Onut:
Towards Building a New Age Commercial Contextual Advertising System. Int. J. Syst. Serv. Oriented Eng. 7(3): 1-14 (2017) - [c29]Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Russell Couturier, Iosif-Viorel Onut:
Tracking Phishing Attacks Over Time. WWW 2017: 667-676 - 2016
- [c28]Salman Hooshmand, Muhammad Faheem, Gregor von Bochmann, Guy-Vincent Jourdan, Russell Couturier, Iosif-Viorel Onut:
D-ForenRIA: a distributed tool to reconstruct user sessions for rich internet applications. CASCON 2016: 64-74 - [c27]Kelly A. Lyons, Eleni Stroulia, Dixin Luo, Renée J. Miller, Vio Onut:
Data-driven knowledge mobilization. CASCON 2016: 280-282 - [c26]Vio Onut:
Establishing a successful industry-academia R&D project. CASCON 2016: 344-346 - [c25]Sara Baghbanzadeh, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Seyed M. Mirtaheri, Muhammad Faheem, Iosif-Viorel Onut:
Reconstructing Interactions with Rich Internet Applications from HTTP Traces. IFIP Int. Conf. Digital Forensics 2016: 147-164 - [c24]Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Fault Tolerant P2P RIA Crawling. NETYS 2016: 32-47 - [c23]Salman Hooshmand, Akib Mahmud, Gregor von Bochmann, Muhammad Faheem, Guy-Vincent Jourdan, Russ Couturier, Iosif-Viorel Onut:
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications. WWW (Companion Volume) 2016: 211-214 - [e2]Marcellus Mindel, Blake Jones, Hausi A. Müller, Vio Onut:
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, CASCON 2016, Toronto, Ontario, Canada, October 31 - November 2, 2016. IBM / ACM 2016 [contents] - 2015
- [c22]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - 2014
- [j4]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Model-Based Rich Internet Applications Crawling: "Menu" and "Probability" Models. J. Web Eng. 13(3&4): 243-262 (2014) - [j3]Mustafa Emre Dincturk, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
A Model-Based Approach for Crawling Rich Internet Applications. ACM Trans. Web 8(3): 19:1-19:39 (2014) - [c21]Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Scalable P2P RIA Crawling System with Partial Knowledge. NETYS 2014: 185-199 - [c20]Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
GDist-RIA Crawler: A Greedy Distributed Crawler for Rich Internet Applications. NETYS 2014: 200-214 - [c19]Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
PDist-RIA Crawler: A Peer-to-Peer Distributed Crawler for Rich Internet Applications. WISE (2) 2014: 365-380 - [c18]Abhimanyu Panwar, Iosif-Viorel Onut, James Miller:
Towards Real Time Contextual Advertising. WISE (2) 2014: 445-459 - [i1]Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Brief History of Web Crawlers. CoRR abs/1405.0749 (2014) - 2013
- [c17]Seyed M. Mirtaheri, Di Zou, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications. 3PGCIC 2013: 105-112 - [c16]Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A brief history of web crawlers. CASCON 2013: 40-54 - [c15]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
Building Rich Internet Applications Models: Example of a Better Strategy. ICWE 2013: 291-305 - [e1]Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang:
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5839-2 [contents] - 2012
- [c14]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Ali Moosavi, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Crawling rich internet applications: the state of the art. CASCON 2012: 146-160 - [c13]Iosif-Viorel Onut:
3rd Workshop on Smart Surveillance System Applications. CASCON 2012: 262-264 - [c12]Suryakant Choudhary, Mustafa Emre Dincturk, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut, Paul Ionescu:
Solving Some Modeling Challenges when Testing Rich Internet Applications for Security. ICST 2012: 850-857 - [c11]Mustafa Emre Dincturk, Suryakant Choudhary, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Statistical Approach for Efficient Crawling of Rich Internet Applications. ICWE 2012: 362-369 - 2011
- [c10]Iosif-Viorel Onut, Don Aldridge, Marcellus Mindel, Stephen Perelgut:
2nd Workshop on Smart Surveillance System Applications. CASCON 2011: 382-384 - [c9]Kamara Benjamin, Gregor von Bochmann, Mustafa Emre Dincturk, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Strategy for Efficient Crawling of Rich Internet Applications. ICWE 2011: 74-89 - 2010
- [c8]Vio Onut, Don Aldridge, Marcellus Mindel, Stephen Perelgut:
Smart surveillance system applications. CASCON 2010: 430-432 - [c7]Ali A. Ghorbani, Iosif-Viorel Onut:
Y-Means: An Autonomous Clustering Algorithm. HAIS (1) 2010: 1-13 - [c6]Kamara Benjamin, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Some Modeling Challenges When Testing Rich Internet Applications for Security. ICST Workshops 2010: 403-409
2000 – 2009
- 2008
- [c5]Iosif-Viorel Onut, Ali A. Ghorbani:
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. HICSS 2008: 203 - 2007
- [j2]Iosif-Viorel Onut, Ali A. Ghorbani:
SVision: A novel visual network-anomaly identification technique. Comput. Secur. 26(3): 201-212 (2007) - [j1]Iosif-Viorel Onut, Ali A. Ghorbani:
A Feature Classification Scheme For Network Intrusion Detection. Int. J. Netw. Secur. 5(1): 1-15 (2007) - [c4]Iosif-Viorel Onut, Ali A. Ghorbani:
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. ISC 2007: 19-36 - 2006
- [c3]Iosif-Viorel Onut, Ali A. Ghorbani:
Toward A Feature Classification Scheme For Network Intrusion Detection. CNSR 2006: 277-284 - 2005
- [c2]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:
SVision: A Network Host-Centered Anomaly Visualization Technique. ISC 2005: 16-28 - 2004
- [c1]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:
A novel visualization technique for network anomaly detection. PST 2004: 167-174
Coauthor Index
aka: Gregor v. Bochmann
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint