Xiao HAN
Xiao HAN
Orange Labs
Verified email at telecom-paristech.fr
Cited by
Cited by
PhishEye: Live Monitoring of Sandboxed Phishing Kits
X Han, N Kheir, D Balzarotti
Computer and Communication Security (CCS), 2016
Deception techniques in computer security: A research perspective
X Han, N Kheir, D Balzarotti
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
Evaluation of Deception-based Web Attacks Detection
X Han, N Kheir, D Balzarotti
Workshop on Moving Target Defense (MTD), 65-73, 2017
The role of cloud services in malicious software: Trends and insights
X Han, N Kheir, D Balzarotti
International Conference on Detection of Intrusions and Malware, and …, 2015
Behavioral fine-grained detection and classification of P2P bots
N Kheir, X Han, C Wolley
Journal of Computer Virology and Hacking Techniques 11 (4), 217-233, 2015
Peerviewer: Behavioral tracking and classification of P2P malware
N Kheir, X Han
International Symposium on Cyberspace Safety and Security, 282-298, 2013
Interpretable and adversarially-resistant behavioral malware signatures
X Han, B Olivier
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1668-1677, 2020
The system can't perform the operation now. Try again later.
Articles 1–7