| Learn to detect phishing scams using learning and ensemble? methods A Saberi, M Vahidi, BM Bidgoli 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2007 | 79 | 2007 |
| Hybrid-bridge: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization A Saberi, Y Fu, Z Lin Proceedings of the 21st annual network and distributed system security …, 2014 | 60 | 2014 |
| A zero knowledge password proof mutual authentication technique against real-time phishing attacks M Sharifi, A Saberi, M Vahidi, M Zorufi International Conference on Information Systems Security, 254-258, 2007 | 22 | 2007 |
| Large-scale, automatic xss detection using google dorks R Pelizzi, T Tran, A Saberi Stony Brook University, Department of Computer Science. URL: https://www3 …, 2011 | 8 | 2011 |
| How to counter control flow tampering attacks M Sharifi, M Zoroufi, A Saberi 2007 IEEE/ACS International Conference on Computer Systems and Applications …, 2007 | 5 | 2007 |
| VMM detection using privilege rings and benchmark execution times M Sharifi, H Salimi, A Saberi, J Gharibshah International Journal of Communication Networks and Distributed Systems 11 …, 2013 | 2 | 2013 |
| SHABaN multi-agent team to herd cows AT Rahmani, A Saberi, M Mohammadi, A Nikanjam, EA Mosabbeb, ... International Workshop on Programming Multi-Agent Systems, 248-252, 2008 | 2 | 2008 |
| Using Type Inference and Abstract Interpretation for Static Binary Analysis A Saberi The Graduate School, Stony Brook University: Stony Brook, NY., 2012 | | 2012 |