Skip to content →


International Conference Publications

  1. Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park*, and Brendan Saltaformaggio*: “Mistrust Plugins You Must: A Large-Scale Study of Malicious Plugins in WordPress Marketplaces”, Proceedings of the 31st Usenix Security Symposium (Security 2022), Acceptance Rate: TBD (To appear) 
    * co-corresponding authors
  2. Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen: “Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection”, Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 2020), Acceptance Rate: 23.7%.
  3. Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen: “Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers”, Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IFIP DSN 2019), Acceptance Rate: 21.4%.
  4. Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen: “Adversarial Learning Attacks on Graph-based IoT Malware Detection System”, Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019), Acceptance Rate: 19.6%.
  5. Jeman Park, Aziz Mohaisen, Charles Kamhoua, Michael Weisman, Nandi Leslie, and Laurent Njilla: “Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments”, Proceedings of the 20th World Conference on Information Security Applications (WISA 2019).
  6. Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen: “Graph-based Comparison of IoT and Android Malware”, Proceedings of the 16th International Conference on Social Networks (CSoNet 2018).
  7. Jeman Park, DaeHun Nyang, and Aziz Mohaisen: “Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks”, Proceedings of the 16th International Conference on Privacy, Security and Trust (PST 2018).
  8. Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, and Aziz Mohaisen: “QoI: Assessing Participation in Threat Information Sharing”, Proceedings of the 43rd International Conference on Acoustics, Speech and Signal Processing (ICASSP 2018).
  9. Jeffrey Spaulding, Jeman Park, Joongheon Kim, and Aziz Mohaisen: “Proactive Detection of Algorithmically Generated Malicious Domains”, Proceedings of the 32nd International Conference on Information Networking (ICOIN 2018).
  10. Jeman Park, Jihye Kim, Seungho Kuk, Yongtae Park, and Hyogon Kim: “Exploring Smartphones as WAVE Devices”, Proceedings of the 82nd Vehicular Technology Conference (IEEE VTC-2015 Fall).

Journal Publications

  1. Jeman Park, Rhongho Jang, Manar Mohaisen, and David Mohaisen: “A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet”, IEEE/ACM Transactions on Networking (ToN), Vol. 30, No.1, pp. 76-89, 2021.
  2. Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, and David Mohaisen: “Domain Name System Security and Privacy: A Contemporary Survey”, Elsevier Computer Networks (COMNET), Vol. 185, 2021.
  3. Jeman Park, Manar Mohaisen, DaeHun Nyang, and David Mohaisen: “Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions”, Elsevier Computer Networks (COMNET), Vol. 173, 2020, (IF:3.11)
  4. Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, DaeHun Nyang, and David Mohaisen: “Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet”, IEEE Access, Vol. 8, 2020, (IF:3.75)
  5. Soohyun Park, Yeongeun Kang, Jeman Park, and Joongheon Kim: “Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications”, EAI Endorsed Transactions on Security and Safety, Vol. 7, No. 23, 2020
  6. Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen: “Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service”, IEEE Transactions on Network and Service Management (TNSM), Vol. 16, No. 4, pp. 1782-1796, 2019, (IF:4.68)
  7. Hisham Alasmary, Amin Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, and Aziz Mohaisen: “Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach”, IEEE Internet of Things Journal (IoTj), Vol. 6, No. 5, pp. 8977-8988, 2019, (IF:9.52)
  8. Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, and Manar Mohaisen: “Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering”, EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 16, 2018
  9. Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, and Aziz Mohaisen: “Thriving on Chaos: Proactive Detection of Command and Control Domains in Internet of Things-Scale Botnets using DRIFT”, Wiley Transactions on Emerging Telecommunications Technologies, e3505, 2018, (IF:1.61)
  10. Song Gun Lee, Jeman Park, and Hyogon Kim: “A User-Side Energy-Saving Video Streaming Scheme for LTE Devices”, IEEE Communication Letters, Vol. 19, No. 6, pp. 965-968, 2015, (IF:1.27)