Mohammad Mamun
Cited by
Cited by
Characterization of Encrypted and VPN Traffic Using Time-Related Features
G Gerard, Drapper, Arash, Habibi, Ali
ICISSP 2016, 407-414, 2016
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
Intrusion detection system architecture for Wireless Sensor Network
MSI Mamun
The State of the Art in Intrusion Prevention and Detection, 391-406, 2014
Hierarchical design based intrusion detection system for wireless ad hoc network
MSI Mamun, AFM Kabir
arXiv preprint arXiv:1208.3772, 2012
AH Lashkari, Y Zang, G Owhuo, M Mamun, G Gil
GitHub.[vid. 2021-08-10]. Dostupné z: https://github. com/ahlashkari …, 2017
An entropy based encrypted traffic classifier
MSI Mamun, AA Ghorbani, N Stakhanova
Information and Communications Security: 17th International Conference …, 2016
Secure VANET applications with a refined group signature
MSI Mamun, A Miyaji
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Using machine learning for dynamic authentication in telehealth: A tutorial
M Hazratifard, F Gebali, M Mamun
Sensors 22 (19), 7655, 2022
A Secure and Private RFID Authentication Protocol under SLPN Problem
M Mamun, A Miyaji, M Rahman
Network and System Security (NSS 2012), 476-489., 2012
Machine learning in precision medicine to preserve privacy via encryption
W Briguglio, P Moghaddam, WA Yousef, I Traoré, M Mamun
Pattern Recognition Letters 151, 148-154, 2021
An optimized signature verification system for vehicle ad hoc network
MSI Mamun, A Miyaji
2012 8th International Conference on Wireless Communications, Networking and …, 2012
Towards a robust and trustworthy machine learning system development: An engineering perspective
P Xiong, S Buffett, S Iqbal, P Lamontagne, M Mamun, H Molyneaux
Journal of Information Security and Applications 65, 103121, 2022
Multifactor Authentication Scheme Using Physically Unclonable Functions
M Fakroon, F Gebali, M Mamun
Internet of Things, 100343, 2020
A privacy-preserving efficient RFID authentication protocol from SLPN assumption
MSI Mamun, A Miyaji
International Journal of Computational Science and Engineering 10 (3), 234-243, 2015
Policy based intrusion detection and response system in hierarchical WSN architecture
MSI Mamun, AF Kabir, MS Hossen, MRH Khan
arXiv preprint arXiv:1209.1678, 2012
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning
M Mamun, K Shi
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
A multi-purpose group signature for vehicular network security
MSI Mamun, A Miyaji, H Takada
2014 17th international conference on network-based information systems, 511-516, 2014
Automated detection of unstructured context-dependent sensitive information using deep learning
H Ahmed, I Traore, S Saad, M Mamun
Internet of Things 16, 100444, 2021
Privacy-preserving computation offloading for time-series activities classification in ehealthcare
Y Zheng, R Lu, M Mamun
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
The system can't perform the operation now. Try again later.
Articles 1–20