Targeted cyberattacks: a superset of advanced persistent threats AK Sood, RJ Enbody IEEE security & privacy 11 (1), 54-61, 2012 | 274 | 2012 |
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market AK Sood, RJ Enbody International journal of critical infrastructure protection 6 (1), 28-38, 2013 | 147 | 2013 |
Malvertising–exploiting web advertising AK Sood, RJ Enbody Computer Fraud & Security 2011 (4), 11-16, 2011 | 90 | 2011 |
A taxonomy of domain-generation algorithms AK Sood, S Zeadally IEEE Security & Privacy 14 (4), 46-53, 2016 | 81 | 2016 |
Targeted cyber attacks: multi-staged attacks driven by exploits and malware A Sood, R Enbody Syngress, 2014 | 76 | 2014 |
An Empirical Study of HTTP Based Financial Botnets A Sood, S Zeadally, R Enbody IEEE Transactions on Dependable and Secure Computing, 2015 | 69 | 2015 |
A key-management-based taxonomy for ransomware P Bajpai, AK Sood, R Enbody 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 58 | 2018 |
Dissecting SpyEye–Understanding the design of third generation botnets AK Sood, RJ Enbody, R Bansal Computer Networks 57 (2), 436-450, 2013 | 55 | 2013 |
Cybercrime: Dissecting the state of underground enterprise AK Sood, R Bansal, RJ Enbody IEEE internet computing 17 (1), 60-68, 2012 | 54 | 2012 |
Drive-by download attacks: A comparative study AK Sood, S Zeadally It Professional 18 (5), 18-25, 2016 | 41 | 2016 |
The art of mapping IoT devices in networks P Bajpai, AK Sood, RJ Enbody Network Security 2018 (4), 8-15, 2018 | 28 | 2018 |
Cybercrime at a scale: A practical study of deployments of HTTP-based botnet command and control panels AK Sood, S Zeadally, R Bansal IEEE Communications Magazine 55 (7), 22-28, 2017 | 22 | 2017 |
Chain exploitation—Social networks malware AK Sood, R Enbody ISACA Journal 1 (31), 1-6, 2011 | 15 | 2011 |
The state of HTTP declarative security in online banking websites A Sood, R Enbody Computer Fraud & Security 2011 (7), 11-16, 2011 | 12 | 2011 |
Exploiting trust: stealthy attacks through socioware and insider threats AK Sood, S Zeadally, R Bansal IEEE Systems Journal 11 (2), 415-426, 2015 | 11 | 2015 |
Browser exploit packs-exploitation tactics AK Sood, RJ Enbody VIRUS BULLETIN, Barcelona, Spain, 2011 | 9 | 2011 |
The Conundrum of Declarative Security {HTTP} Response Headers: Lessons Learned AK Sood, RJ Enbody 2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10), 2010 | 9 | 2010 |
US Military Defense Systems: The Anatomy of Cyber Espionage by Chinese Hackers AK Sood, R Enbody Georgetown Journal of International Affairs 19, 2014 | 8 | 2014 |
Prosecting the citadel botnet revealing the dominance of the zeus descendent S Aditya, B Rohit Virus Bulletin, 2014 | 7 | 2014 |
Frametrapping the framebusting defence AK Sood, RJ Enbody Network Security 2011 (10), 8-12, 2011 | 7 | 2011 |