2024 N. Vlajic, G. Cianfarani, R. Noce Risk-Based Methodology for Optimal Cryptoperiod Calculation in ICSs Under Data Siphoning Attack RICSS Workshop, 27th ACM Conference on Computer and Communications Security (ACM CCS 2024), Salt Lake City, USA, October 2024. D. Brown, N. Vlajic Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark IEEE International Conference on Cyber Security and Resilience (IEEE CNS), London, England, September 2024. S. Sadeghpour, N. Vlajic ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks IEEE International Conference on Cyber Security and Resilience (IEEE CNS), London, England, September 2024. N. Vlajic, G. Cianfarani, R. Noce Data Siphoning in ICS: Attack Tree and Role of Cryptoperiods IEEE International Conference on Cyber Security and Resilience (IEEE CNS), London, England, September 2024. |
2023 S. Sadeghpour, N. Vlajic RanABD: MTD-Based Technique for Detection of Advanced Session-Replay Web Bots 26th ACM Conference on Computer and Communications Security (ACM CCS 2023), Copenhagen, Denmark, November 2023. D. Brown, N. Vlajic Novel Client-Side Watermarking Technique for Tor User De-Anonymization 23rd ACM Internet Measurement Conference (ACM ICM 2023), Montreal, Canada, October 2023. S. Sadeghpour, N. Vlajic RanABD: Web Page Randomization for Advanced Web-Bot Detection 7th IEEE Cyber Security in Networking Conference (CSNet 2023), Montreal, Canada, October 2023. N. Vlajic, J. Mirkovic, R. Noce FT Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs) IEEE Communications Magazine, Vol 61, Issue 6, June 2023. S. Petrovic, N. Vlajic PIRAT - Tool for Automated Cyber-Risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases (Best Poster Award) 14th ACM/IEEE International Conference on Cyber-Physical Systems (ACM/IEE ICCPS), San Antonio, Texas, USA, May 2023. S. Sadeghpour, N. Vlajic ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots MDPI Journal of Cybersecurity and Privacy, February 2023. S. Sadeghpour, N. Vlajic Analysis of Novel Mouse Dyamics Dataset with Repeat Sessions: Helpful Observations for Tackling Session-Replay Bots IEEE Consumer Communications & Networking Conference (IEEE CCNC 2023), Las Vegas, NV, USA, January 2023. |
2022 S. Sadeghpour, N. Vlajic ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots 25th ACM Conference on Computer and Communications Security (ACM CCS 2022), Los Angeles, USA, November 2022. J. Chung, N. Vlajic Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector IEEE Conference on Computer and Network Security (IEEE CNS), Austin, TX, USA, October 2022. D. Brown, G. Cianfarani, N. Vlajic Real World Snapshot of Trends in IoT Device and Protocol Deployment IEEE Conference on Computer and Network Security (IEEE CNS), Austin, TX, USA, October 2022. P. Madani, N. Vlajic Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: comparative study ADIoT Workshop, 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 2022. P. Madani, N. Vlajic Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems ACM Journal of Digital Threats: Research and Practice (ACM DTRAP), April 2022. |
2021 S. Sadeghpour, N. Vlajic Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising MDPI Journal of Cybersecurity and Privacy, 1(4), pp. 804-832, December 2021. S. Sadeghpour, N. Vlajic Click Fraud in Digital Advertising: A Comprehensive Survey MDPI Computers Journal 10(12), December 2021. J. Sahota, N. Vlajic Mozi IoT Malware and Its Botnets: From Theory to Real-World Observations CSI-ISCW Cyber Warfare, Cyber Defence & Cyber Security Symposium, Las Vegas, USA, December, 2021. P. Madani, N. Vlajic RSSI-Based MAC-layer Spoofing Detection: Deep Learning Approach MDPI Journal of Cybersecurity and Privacy, 1(3), pp. 453-469, August 2021. S. Sadeghpour, N. Vlajic, D. Stevanovic, P. Madani Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation IEEE Consumer Communications & Networking Conference (CCNC 2021), Las Vegas, USA January 2021. |
2020 P. Madani, N. Vlajic, S. Sadeghpour MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach ACM Conference on Computer and Communications Security (ACM CCS 2020), Workshop on CPS&IoT Security and Privacy, Orlando, USA, November 2020. |
2019 N. Vlajic, M. Chowdhury, M. Litoiu IP Spoofing In and Out of the Public Cloud: Form Policy to Practice MDPI Computers Journal, 8(4), 81, November 2019. P. Madani, N. Vlajic Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments 14th International Conference on Availability, Reliability and Security (ARES 2019), FARES Workshop, Canterbury, UK, August 2019. M. Chowdhury, N. Vlajic IP Spoofing in the Cloud: An Experimental Study IEEE Conference on Computer and Network Security (IEEE CNS), Washington, D.C., USA, June 2019. |
2018 N. Vlajic, M. El Masri, G. M. Riva, D. Doran, M. Barry Online Tracking of Kids and Teens by Means of Invisible Images: COPPA vs. GDPR ACM CCS Workshop on Multimedia Privacy and Security (ACM CCS 2018), Toronto, Canada, October 2018. Z. Matthews, N. Vlajic Can Browser Add-Ons Protect Your Children from Online Tracking? 25th ACM Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 2018. N. Vlajic, D. Zhou, J. Tung IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker's Perspective 3rd IEEE International IoT/CPS-Security Workshop, IEEE International Conference on Industrial Internet (IEEE ICII 2018), Bellevue, WA, USA, October 2018 (to be held). N. Vlajic, P. Madani, E. Nguyen Clickstream Tracking of TOR Users: May Be Easier Than You Think Journal of Cyber Security Technology, September 2018. N. Vlajic, D. Zhou IoT as a Land of Opportunity for DDoS Hackers IEEE Computer Magazine, Volume 51, Number 7, pp. 26-34, July 2018. N. Vlajic, S. N. W. Chow, X. Charles Malwareless Web-Analytics Pollution (MWAP): A Very Simple Yet Invincible Attack Workshop on Business Analytics in Practice and Applied Research (BAPAR 2018) in the 20th IEEE International Conference on Business Informatics (IEEE CBI 2018), Vienna, Austria, July 2018. N. Vlajic, M. El Masri Online Tracking of Kids and Teens: Gaming Sites Not as Bad as Others 39th IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, CA, USA, May 2018. P. Madani, N. Vlajic Robustness of Deep Autoencoder in Intrusion Detection Under Adversarial Contamination (Best Paper Award) Hot Topics in the Science of Security (HoTSoS 2018), Raleigh, North Carolina, April 2018. |
2017 N. Vlajic, X. Y. Shi, H. Roumani, P. Madani Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!? Journal of Cyber Security and Mobility, pp. 195-226, Vol 6, Issue 2, December 2017. N. Vlajic, P. Madani Anonymity of TOR Users Demystified IEEE 2017 Symposium on Cyber Warfare, Cyber Defense, and Cyber Security (IEEE CSCI-ISCW), Las Vegas, NV, December 2017. M. El Masri, N. Vlajic Current State of Client-side Extensions Aimed at Protecting Against CSRF-like Attacks IEEE Conference on Computer and Network Security (IEEE CNS), Las Vegas, NV, USA, October 2017. N. Vlajic, X. Y. Shi, H. Roumani, P. Madani Resource Hints in HTML5: A New Pandora's Box of Security Nightmares 12th International Conference on Availability, Reliability and Security (ARES 2017), IWCC Workshop, Reggio Calabria, Italy, August 2017. N. Vlajic, X. Y. Shi, H. Roumani Is That Your Browser Turning Against You? 12th International Conference on Cyber Warfare and Security (ICCWS), Dayton, Ohio, USA, March 2017. |
2016 P. Madani, N. Vlajic Towards Sequencing Malicious System Calls IEEE Conference on Computer and Network Security (IEEE CNS), Philadelphia, PA, USA, October 2016. |
2015 Y. Yang, N. Vlajic, U. T. Nguyen Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites IEEE Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2015), New York, NY, USA, November 2015. Y. Yang, N. Vlajic, U. T. Nguyen Web Bots that Mimic Human Browsing Behavior on Previously Unvisited Web-Sites IEEE Conference on Communications and Network Security (IEEE CNS 2015), Florence, Italy, September 2015. |
2014 N. Vlajic, A. Slopek Web Bugs in the Cloud: Feasibility Study of a New Form of EDoS Attack IEEE Globecom Workshop on Cloud Computing Systems, Networks and Applications (IEEE Globecom CCSNA 2014), Austin, TX, USA, December 2014. D. Stevanovic, N. Vlajic Next Generation Application-Layer DDoS Defences: Applying the Concept of Outlier Detection in Data Streams with Concept Drift IEEE International Conference on Machine Learning and Application (IEEE ICMLA 2014), Detroit, MI, USA, December 2014. N. Vlajic, A. Slopek Performance and Economics of Bot-less Application-Layer DDoS Attacks 9th IEEE International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, December 2014. D. Stevanovic, N. Vlajic Application-Layer DDoS in Dynamic Web-Domains: Building Defenses against Next-Generation Attack Behavior IEEE Conference on Communications and Network Security (IEEE CNS 2014), San Francisco, CA, USA, October 2014. A. Slopek, N. Vlajic Economic Denial of Sustainability (EDoS) Attack in the Cloud using Web-bugs 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014), Gothenburg, Sweden , September 2014. |
2013 M. Marquez-Andrade, H. Roumani, N. Vlajic CSRF and Big Data: Rethinking Cross Site Request Forgery in Light of Big Data Book Chapter in Emerging Trends in Information and Communication Technologies Security, pp. 315-334, Elsevier (Morgan Kaufmann), 2013. D. Stevanovic, N. Vlajic An Integrated Approach to Defence Against Degrading Application-Layer DDoS Attacks 12th International Conference on Security and Management (SAM 2013), Las Vegas, USA, July 2013. M. Andrade, N. Vlajic Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS International Journal of Intelligent Computing Research (IJICR), pp. 316-322, Volume 4, Issue 2, June 2013. D. Stevanovic, N. Vlajic, A. An Detection of Malicious and Non-malicious Website Visitors Using Unsupervised Neural Network Learning Elsevier Applied Soft Computing Journal, pp. 698-708, Volume 13, Issue 1, January 2013. D. Drinfeld, N. Vlajic, D. Stevanovic Bots for Flash-Crowd DDoS that Mimic Human Behavior: Are We There Yet? Accepted for publication in InderScience International Journal of Internet Technology and Secured Transactions (IJITST). |
2012 D. Stevanovic, A. An, N. Vlajic Feature Evaluation for Web Crawler Detection with Data Mining Techniques Elsevier Expert Systems With Applications Journal, pp. 8707-8717, Volume 39, Issue 10, August 2012. N. Vlajic, M. Andrade, U. T. Nguyen The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It? 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), Niagara Falls, Canada, August 2012. D. Drinfeld, N. Vlajic Smart Crawlers for Flash-Crowd DDoS: The Attacker's Perspective IEEE World Congress on Internet Security (WorldCIS 2012), Guelph, Canada, June 2012. A. Naumov, N. Vlajic, H. Roumani VLUS: Visual Location-Based URL Screening Tool for Improved WWW Security IEEE World Congress on Internet Security (WorldCIS 2012), Guelph, Canada, June 2012. M. Andrade, N. Vlajic Dirt Jumper: A Key Player in Today's Botnet-for-DDoS Market IEEE World Congress on Internet Security (WorldCIS 2012), Guelph, Canada, June 2012. A. Naumov, N. Vlajic, H. Roumani GeoTracking of Web Page Sources: A Defence Against Drive-by-Download Attacks International Journal of Internet Technology and Secured Transactions, pp. 312-326, Volume 4, Issue 4, May 2012. N. Vlajic, G. Spanogiannopoulos, D. Stevanovic Data Streaming in ZigBee WSNs: Simple Steps to Optimize Network Performance IEEE Radio and Wireless Week (IEEE RWW 2012), Santa Clara, CA, USA, January 2012. |
2011 N. Vlajic, U. T. Nguyen DNS TTL Values as Potent Allies of DDoS Attackers 27th Annual Computer Security Application Conference (ACSAC 2011), Orlando, Florida, USA, December 2011. D. Stevanovic, N. Vlajic, A. An Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users 2nd International Conference on Ambient Systems, Networks and Technologies (ANT 2011), Niagara Falls, Canada, September 2011, pp. 123 - 131. D. Stevanovic, A. An, N. Vlajic Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers 19th International Symposium on Methodologies for intelligent Systems (ISMIS 2011), Warsaw, Poland, June 2011, pp. 483 - 389. N. Vlajic, D. Stevanovic, G. Spanogiannopoulos Strategies for Improving Performance of IEEE 802.15.4/ZigBee WSNs with Path-Constrained Mobile Sink(s) Elsevier Computer Communications Journal, pp. 743-757, Volume 34, Issue 6, May 2011. |
2010 N. Vlajic, D. Stevanovic, G. Spanogiannopoulos Sink Mobility in Wireless Sensor Networks: From Theory to Practice Book Chapter in "Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice", pp. 371-403, IGI Global (2010). |
2009 N. Vlajic, N. Moniz, M. Portnoy Self-Healing Wireless Sensor Networks Book Chapter in "Cooperative Wireless Communications", pp. 475-503, CRC Press, Taylor&Francis Group (2009). G. Spanogiannopoulos, N. Vlajic, D. Stevanovic A Simulation-Based Performace Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks 1st International Conference on Ad Hoc Networks (ADHOCNETS 2009), Niagara Falls, Canada, September 2009, pp. 300 - 315. N. Vlajic, D. Stevanovic Sink mobility in wireless sensor networks: A (mis)match between theory and practice 5th ACM International Wireless Communications and Mobile Computing Conference (IWCMC 2009), Leipzig, Germany, June 2009, pp. 386-393. N. Vlajic, D. Stevanovic Performance Analysis of ZigBee-based Wireless Sensor Networks with Path-Constrained Mobile Sink(s) IARIA (IEEE co-sponsored) 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM 2009), Athens, Greece, June 2009, pp. 61-68. N. Vlajic, D. Stevanovic Sink Mobility in Wireless Sensor Networks: When Theory Meets Reality IEEE Sarnoff Symposium 2009, Princeton, New Jersey, March 2009, Digital Object Identifier 10.1109/SARNOF.2009.4850301. |
2008 D. Stevanovic, N. Vlajic Performance of IEEE 802.15.4 in Wireless Sensor Networks with a Mobile Sink Implementing Various Mobility Strategies IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (IEEE P2MNET), part of IEEE LCN, Montreal, Canada, October 2008, pp. 680-688. N. Vlajic, N. Moniz, M. Portnoy Combating routing holes by means of mobile nodes: Should energy really matter!? IEEE Radio and Wireless Symposium (IEEE RWS 2008), Orlando, FL, USA, January 2008, pp. 835-838. |
2007 D. Xia and N. Vlajic Comprehensive Study of Node Clustering in Wireless Sensor Networks for Environment Monitoring Ad Hoc & Sensor Wireless Networks Journal, Old City Publishing, pp. 199-228, Volume 4, Number 3, 2007. N. Vlajic, N. Moniz Combating Routing Holes by Means of Mobile Nodes: Results That May Surprise IEEE Globecom 2007, Workshop on Distributed Autonomous Network Management Systems (IEEE DANMS), Washington, DC, USA, November 2007, Digital Object Identifier 10.1109/GLOCOMW.2007.4437830 (page(s): 1-6). D. Xia and N. Vlajic Near-optimal Node Clustering in Wireless Sensor Networks for Environment Monitoring (Nokia Best Student Paper Award) The IEEE 21st International Conference on Advanced Information Networking and Applications (IEEE AINA-07), Niagara Falls, Canada, May 2007, pp. 632-641. M. Portnoy and N. Vlajic Combating Routing Microholes in Hybrid Wireless Sensor Networks The 7th IASTED International Conference on Wireless and Optical Communications, Montreal, Canada, May 2007, pp. 565-572. |
2006 N. Vlajic and D. Xia Wireless Sensor Networks: To Cluster or Not To Cluster? IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (IEEE WoWMoM 2006), Niagara-Falls, Buffalo-NY, USA, June 2006, pp. 258-286. D. Xia and N. Vlajic Near-Optimal Node Clustering in Wireless Sensor Networks for Environment Monitoring: Preliminary Results IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE 06), Ottawa, Canada, May 2006, pp. 1825-1829. T. Xue and N. Vlajic Analytical and Simulation Based Evaluaton of Wireless-to-Wireline TCP-SYN Attacks IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE 06), Ottawa, Canada, May 2006, pp. 746-749. |
2004 N. Vlajic, C. D. Charalambous, D. Makrakis Performance Aspects of Data Broadcast in Wireless Networks with User Retrials IEEE/ACM Transactions on Networking, pp. 620-633, Volume 12, Issue: 4, August 2004. |
2003 N. Vlajic, C. D. Charalambous, D. Makrakis Wireless Data Broadcast in Systems of Hierarchical Cellular Organization IEEE International Conference on Communications (IEEE ICC 2003), Anchorage, Alaska, USA, May 2003, pp. 1863-1869. N. Vlajic, C. D. Charalambous, D. Makrakis TDM- vs. FDM- Based Broadcast Scheduling in Wireless Systems with User Retrials IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE'03), Montreal, Canada, May 2003, pp. 1811-1814. L. Wang, C. D. Charalambous, D. Makrakis, N. Vlajic Data Broadcasting in Ad-Hoc Networks of Pervasive Devices: Modeling and Simulations IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE'03), Montreal, Canada, May 2003, pp. 951-954. |
2002 N. Vlajic, C. D. Charalambous, D. Makrakis Networks of Pervasive Devices: Fast CPU Conserving Algorithm for Optimal Broadcast Scheduling Scheme Estimation IEEE Canadian Conference on Electrical and Computer Engineering (IEEE CCECE'02), Winnipeg, Canada, May 2002, pp. 1392-1399. N. Vlajic, C. D. Charalambous, D. Makrakis Generalized Wireless Data Broadcast System Analysis: Multiobjective Performance Measures IASTED International Multi-Conference on Applied Informatics (IASTED AI 2002), Innsbruck, Austria, February 2002, pp. 351-358. |
2001 N. Vlajic and H. C. Card Vector Quantization of Images using Modified Adaptive Resonance Algorithm for Hierarchical Clustering IEEE Transactions on Neural Networks, pp. 1147–1162, Volume: 12, Issue: 5 , September 2001. N. Vlajic, D. Makrakis, C. D. Charalambous Near Optimal Wireless Data Broadcasting Based on an Unsupervised Neural Network Learning Algorithm International Joint INNS-IEEE Conference on Neural Networks (INNS-IEEE IJCNN 2001), Washington DC, USA, July 2001, pp. 715-720. N. Vlajic, C. D. Charalambous, D. Makrakis Wireless Broadcast Data Scheduling in Environment with Re-attempt Users: Optimization through Intelligent Feedback Monitoring IEEE International Conference on Third Generation Wireless and Beyond, San Francisco, USA, May 2001, pp. 372-379. |
2000 N. Vlajic, H. C. Card, T. Kunz Image compression for wireless World Wide Web browsing: a neural network approach IEEE-INNS-ENNS International Joint Conference on Neural Networks (IEEE-INNS-ENNS IJCNN 2000), Como, Italy, July 2000, pp. 169-176. |
1999 N. Vlajic and H. C. Card Categorizing Web Pages on the Subject of Neural Networks Elsevier Journal of Network and Computer Applications, pp. 91-105, Volume: 21, Issue: 2, April 1999. N. Vlajic and H. C. Card An adaptive neural network approach to hypertext clustering IEEE-INNS-ENNS International Joint Conference on Neural Networks (IEEE-INNS-ENNS IJCNN 1999), Washington DC, USA, July 1999, pp. 3722-3726. N. Vlajic and H. C. Card Adaptive Algorithms for Hypertext Clustering International Conference on Computational Intelligence for Modeling Control and Automation (CIMCA'99), Vienna, Austria, February 1999, pp. 142-148. |
1998 N. Vlajic and H. C. Card Categorizing Web Pages using modified ART IEEE 1998 Canadian Conference on Electrical and Computer Engineering (IEEE CCECE’98), Waterloo, Canada, May 1998, pp. 313-316. |