Sumayah Alrwais

Ph.D. Candidate in Computer Science
School of Informatics and Computing
Indiana University, Bloomington, Indiana, USA




Advisor: Prof. Xiaofeng Wang

Research Interests: Web security and Internet fraud.

Publications: Google Scholar

Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, and XiaoFeng Wang, ''Understanding the Dark Side of Domain Parking'', 23rd Usenix Security Symposium, San Diego, August. 2014. (acceptance rate 19.1% = 67/350) [PDF] [LightningTalk]

Zhou Li, Sumayah Alrwais, XiaoFeng Wang, ''Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections'', 35th IEEE Symposium on Security and Privacy (S&P14), San Jose, CA, May.2014. (acceptance rate 12% = 38/315)

Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang, ''Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures'', 34th IEEE Symposium on Security and Privacy (S&P13), San Francisco, CA, May. 2013. (acceptance rate 12% = 38/315)

Sumayah Alrwais, Christopher Dunn, Minaxi Gupta, Alexandre Gerber, Oliver Spatscheck and Eric Osterweil, ''Dissecting Ghost Clicks: A Tale of Ad Fraud Via Misdirected Human Clicks'', Annual Computer Security Applications Conference (ACSAC), 2012. (acceptance rate 19% = 44/231)

Jalal Al-Muhtadi, Raquel Hill and Sumayah Alrwais ''Access control using threshold cryptography for ubiquitous computing environments'', Journal of King Saud University - Computer and Information Sciences, Volume 23, Issue 2, July 2011, Pages 71-78

Sumayah Alrwais, Jalal Al-Muhtadi, "A Context-Aware Access Control Model for Pervasive Environments'', Special Issue of IETE Technical Review, vol27, issue3, May-June 2010

Sumayah Alrwais, Jalal Al-Muhtadi, ''Context-Aware Access Control using Threshold Cryptography,'' First Scientific conference for students of higher education in Saudi Arabia. March 2010, Riyadh, Saudi Arabia

Sumayah Alrwais, Jalal Al-Muhtadi, "A Context-Aware Access Control Model for Pervasive Environments,'' nss, pp.425-430, 2009 Third International Conference on Network and System Security, 2009