Follow
Junaid Haseeb
Junaid Haseeb
Lecturer in Cyber Security, University of Waikato
Verified email at waikato.ac.nz
Title
Cited by
Cited by
Year
A measurement study of iot-based attacks using iot kill chain
J Haseeb, M Mansoori, I Welch
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
212020
Autoencoder-based feature construction for IoT attacks clustering
J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch
Future Generation Computer Systems 127, 487-502, 2022
182022
Application of formal methods to modelling and analysis aspects of business process reengineering
J Haseeb, N Ahmad, SUR Malik, A Anjum
Business Process Management Journal 26 (2), 548-569, 2020
142020
Identifying deviations in software processes
B Zuhaira, N Ahmad, T Saba, J Haseeb, SUR Malik, U Manzoor, ...
IEEE Access 5, 20319-20332, 2017
92017
Secure provenance in wireless sensor networks-a survey of provenance schemes
K Hameed, J Haseeb, M Tayyab, M Junaid, TB Maqsood, MH Naqvi
2017 International Conference on Communication, Computing and Digital …, 2017
82017
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT
J Haseeb, M Mansoori, I Welch
2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021
62021
Iot attacks: Features identification and clustering
J Haseeb, M Mansoori, H Al-Sahaf, I Welch
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
62020
Probabilistic modelling of deception-based security framework using markov decision process
J Haseeb, SUR Malik, M Mansoori, I Welch
Computers & Security 115, 102599, 2022
52022
Deception-Based Security Framework for IoT: An Empirical Study
J Haseeb
Open Access Te Herenga Waka-Victoria University of Wellington, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–9