Search Results - "Liu, Daiping"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Detecting Malicious Javascript in PDF through Document Instrumentation by Daiping Liu, Haining Wang, Stavrou, Angelos

    “…An emerging threat vector, embedded malware inside popular document formats, has become rampant since 2008. Owed to its wide-spread use and Javascript support,…”
    Get full text
    Conference Proceeding
  2. 2

    E-Android: A New Energy Profiling Tool for Smartphones by Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Stavrou, Angelos

    “…As the limited battery lifetime remains a major factor restricting the applicability of a smartphone, significant research efforts have been devoted to…”
    Get full text
    Conference Proceeding
  3. 3

    Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency by Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Stavrou, Angelos

    “…As the most commonly used bots in first-person shooter (FPS) online games, aimbots are notoriously difficult to detect because they are completely passive and…”
    Get full text
    Conference Proceeding
  4. 4

    A Comprehensive Measurement-based Investigation of DNS Hijacking by Houser, Rebekah, Hao, Shuai, Li, Zhou, Liu, Daiping, Cotton, Chase, Wang, Haining

    “…Attacks against the domain name system (DNS) have long plagued the Internet, requiring continual investigation and vigilance to prevent the abuse of this…”
    Get full text
    Conference Proceeding
  5. 5

    Understanding and Detecting Newly Emerging Attack Vectors in Cybercrimes by Liu, Daiping

    Published 01-01-2018
    “…Numerous efforts have been devoted to securing computer systems in the past decade, which has rendered many previously popular attacks ineffective. In response…”
    Get full text
    Dissertation
  6. 6

    Dynamic application flow cluster based on traffic behavior distance by Peng, Bichen, Guo, Wei, Liu, Daiping, Fu, Jianming

    “…New network applications as well as security threats are emerging in an endless stream. However, existing methods cannot efficiently identify and classify the…”
    Get full text
    Conference Proceeding