Mohamed Nabeel
Purdue University
H-index: 18
North America-United States
Top articles of Mohamed Nabeel
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Phishing domain detection systems and methods | 2023/1/3 | ||
Systems and methods for encrypted message filtering | 2023/10/10 | ||
A large scale study and classification of virustotal reports on phishing and malware urls | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Euijin Choo Mohamed Nabeel Doowon Kim Ravindu De Silva Ting Yu | 2023/12/12 |
Vaccination trials on hold: malicious and low credibility content on Twitter during the AstraZeneca COVID-19 vaccine development | Computational and Mathematical Organization Theory | Sameera Horawalavithana Ravindu De Silva Nipuna Weerasekara NG Kin Wai Mohamed Nabeel | 2023/9 |
Generating high-quality threat intelligence from aggregated threat reports | 2023/6/29 | ||
PDNS-Net: A large heterogeneous graph benchmark dataset of network resolutions for graph learning | arXiv preprint arXiv:2203.07969 | Udesh Kumarasinghe Fatih Deniz Mohamed Nabeel | 2022/3/15 |
Brand squatting domain detection systems and methods | 2022/6/23 | ||
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior | arXiv preprint arXiv:2206.05679 | Enes Altinisik Husrev Taha Sencar Mohamed Nabeel Issa Khalil Ting Yu | 2022/6/12 |
CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform | arXiv preprint arXiv:2202.07883 | Wathsara Daluwatta Ravindu De Silva Sanduni Kariyawasam Mohamed Nabeel Charith Elvitigala | 2022/2/16 |
HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks | Udesh Kumarasinghe Mohamed Nabeel Kasun De Zoysa Kasun Gunawardana Charitha Elvitigala | 2022/11/28 | |
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors | Saravanan Thirumuruganatha Mohamed Nabeel Euijin Choo Issa Khalil Ting Yu | 2022/5 | |
GREENER: Graph neural networks for news media profiling | arXiv preprint arXiv:2211.05533 | Panayot Panayotov Utsav Shukla Husrev Taha Sencar Mohamed Nabeel Preslav Nakov | 2022/11/10 |
PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs | Shehan Vidyakeerthi Mohamed Nabeel Charith Elvitigala Chamath Keppitiyagama | 2022/4/25 | |
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference | ACM Transactions on Privacy and Security | Euijin Choo Mohamed Nabeel Mashael Alsabah Issa Khalil Ting Yu | 2022/11/7 |
Compromised mobile device detection system and method | 2022/4/14 | ||
Content-agnostic detection of phishing domains using certificate transparency and passive dns | Mashael AlSabah Mohamed Nabeel Yazan Boshmaf Euijin Choo | 2022/10/26 | |
Identifying and characterizing COVID-19 themed malicious domain campaigns | Pengcheng Xia Mohamed Nabeel Issa Khalil Haoyu Wang Ting Yu | 2021/4/26 | |
Malicious and Low Credibility URLs on Twitter during COVID-19 | Sameera Horawalavithana RD Silva Mohamed Nabeel Charitha Elvitigala P Wijesekara | 2021/2/24 | |
Compromised or {Attacker-Owned}: A large scale classification and study of hosting domains of malicious {URLs} | Ravindu De Silva Mohamed Nabeel Charith Elvitigala Issa Khalil Ting Yu | 2021 | |
Method and system for domain maliciousness assessment via real-time graph inference | 2021/12/21 |