No photo of Mashael Saad F A Al-Sabah

Dr. Mashael Saad F A Al-Sabah

    Calculated based on number of publications stored in Pure and citations from Scopus
    20072024

    Research activity per year

    Filter
    Conference contribution

    Search results

    • 2022

      Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS

      Alsabah, M., Nabeel, M., Boshmaf, Y. & Choo, E., 26 Oct 2022, Proceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022. Association for Computing Machinery, p. 446-459 14 p. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      9 Citations (Scopus)
    • Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection

      Dodia, P., Alsabah, M., Alrawi, O. & Wang, T., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 875-889 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      22 Citations (Scopus)
    • 2020

      Investigating MMM Ponzi Scheme on Bitcoin

      Boshmaf, Y., Elvitigala, C., Al Jawaheri, H., Wijesekera, P. & Al Sabah, M., 5 Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. Association for Computing Machinery, Inc, p. 519-530 12 p. (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      Open Access
      16 Citations (Scopus)
    • 2019

      BlockTag: Design and applications of a tagging system for blockchain analysis

      Boshmaf, Y., Jawaheri, H. A. & Sabah, M. A., 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 299-313 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      11 Citations (Scopus)
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network

      Basyoni, L., Erbad, A., Alsabah, M., Fetais, N. & Guizani, M., Jun 2019, 2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019. Institute of Electrical and Electronics Engineers Inc., p. 635-642 8 p. 8766609. (2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      7 Citations (Scopus)
    • 2015

      Circuit fingerprinting attacks: Passive deanonymization of tor hidden services

      Kwon, A., AlSabah, M., Lazar, D., Dacier, M. & Devadas, S., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 287-302 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      131 Citations (Scopus)
    • 2013

      PCTCP: Per-circuit TCP-over-IPsec transport for anonymous communication overlay networks

      AlSabah, M. & Goldberg, I., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 349-360 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      32 Citations (Scopus)
    • The path less travelled: Overcoming Tor's bottlenecks with traffic splitting

      AlSabah, M., Bauer, K., Elahi, T. & Goldberg, I., 2013, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Proceedings. p. 143-163 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7981 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      30 Citations (Scopus)
    • 2012

      Changing of the guards: A framework for understanding and improving entry guard selection in Tor

      Elahi, T., Bauer, K., Alsabah, M., Dingledine, R. & Goldberg, I., 2012, WPES'12 - Proceedings of the Workshop on Privacy in the Electronic Society. p. 43-53 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      49 Citations (Scopus)
    • Enhancing Tor's performance using real-time traffic classification

      AlSabah, M., Bauer, K. & Goldberg, I., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 73-84 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      76 Citations (Scopus)
    • 2011

      DefenestraTor: Throwing out windows in Tor

      AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S. & Voelker, G. M., 2011, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Proceedings. Springer Verlag, p. 134-154 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6794 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

      37 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.