Follow
Aditya K Sood
Title
Cited by
Cited by
Year
Targeted cyberattacks: a superset of advanced persistent threats
AK Sood, RJ Enbody
IEEE security & privacy 11 (1), 54-61, 2012
2742012
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market
AK Sood, RJ Enbody
International journal of critical infrastructure protection 6 (1), 28-38, 2013
1472013
Malvertising–exploiting web advertising
AK Sood, RJ Enbody
Computer Fraud & Security 2011 (4), 11-16, 2011
902011
A taxonomy of domain-generation algorithms
AK Sood, S Zeadally
IEEE Security & Privacy 14 (4), 46-53, 2016
812016
Targeted cyber attacks: multi-staged attacks driven by exploits and malware
A Sood, R Enbody
Syngress, 2014
762014
An Empirical Study of HTTP Based Financial Botnets
A Sood, S Zeadally, R Enbody
IEEE Transactions on Dependable and Secure Computing, 2015
692015
A key-management-based taxonomy for ransomware
P Bajpai, AK Sood, R Enbody
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
582018
Dissecting SpyEye–Understanding the design of third generation botnets
AK Sood, RJ Enbody, R Bansal
Computer Networks 57 (2), 436-450, 2013
552013
Cybercrime: Dissecting the state of underground enterprise
AK Sood, R Bansal, RJ Enbody
IEEE internet computing 17 (1), 60-68, 2012
542012
Drive-by download attacks: A comparative study
AK Sood, S Zeadally
It Professional 18 (5), 18-25, 2016
412016
The art of mapping IoT devices in networks
P Bajpai, AK Sood, RJ Enbody
Network Security 2018 (4), 8-15, 2018
282018
Cybercrime at a scale: A practical study of deployments of HTTP-based botnet command and control panels
AK Sood, S Zeadally, R Bansal
IEEE Communications Magazine 55 (7), 22-28, 2017
222017
Chain exploitation—Social networks malware
AK Sood, R Enbody
ISACA Journal 1 (31), 1-6, 2011
152011
The state of HTTP declarative security in online banking websites
A Sood, R Enbody
Computer Fraud & Security 2011 (7), 11-16, 2011
122011
Exploiting trust: stealthy attacks through socioware and insider threats
AK Sood, S Zeadally, R Bansal
IEEE Systems Journal 11 (2), 415-426, 2015
112015
Browser exploit packs-exploitation tactics
AK Sood, RJ Enbody
VIRUS BULLETIN, Barcelona, Spain, 2011
92011
The Conundrum of Declarative Security {HTTP} Response Headers: Lessons Learned
AK Sood, RJ Enbody
2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10), 2010
92010
US Military Defense Systems: The Anatomy of Cyber Espionage by Chinese Hackers
AK Sood, R Enbody
Georgetown Journal of International Affairs 19, 2014
82014
Prosecting the citadel botnet revealing the dominance of the zeus descendent
S Aditya, B Rohit
Virus Bulletin, 2014
72014
Frametrapping the framebusting defence
AK Sood, RJ Enbody
Network Security 2011 (10), 8-12, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20