关注
Mohammad Mamun
标题
引用次数
引用次数
年份
Characterization of Encrypted and VPN Traffic Using Time-Related Features
G Gerard, Drapper, Arash, Habibi, Ali
ICISSP 2016, 407-414, 2016
815*2016
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
6722017
Intrusion detection system architecture for Wireless Sensor Network
MSI Mamun
The State of the Art in Intrusion Prevention and Detection, 391-406, 2014
165*2014
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
1642016
Hierarchical design based intrusion detection system for wireless ad hoc network
MSI Mamun, AFM Kabir
arXiv preprint arXiv:1208.3772, 2012
802012
CICFlowMeter
AH Lashkari, Y Zang, G Owhuo, MSI Mamun, GD Gil
GitHub.[vid. 2021-08-10]. Dostupné z: https://github. com/ahlashkari …, 2017
342017
An entropy based encrypted traffic classifier
MSI Mamun, AA Ghorbani, N Stakhanova
Information and Communications Security: 17th International Conference …, 2016
282016
Secure VANET applications with a refined group signature
MSI Mamun, A Miyaji
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
252014
A Secure and Private RFID Authentication Protocol under SLPN Problem
M Mamun, A Miyaji, M Rahman
Network and System Security (NSS 2012), 476-489., 2012
222012
A privacy-preserving efficient RFID authentication protocol from SLPN assumption
MSI Mamun, A Miyaji
International Journal of Computational Science and Engineering 10 (3), 234-243, 2015
162015
Policy based intrusion detection and response system in hierarchical WSN architecture
MSI Mamun, AF Kabir, MS Hossen, MRH Khan
arXiv preprint arXiv:1209.1678, 2012
162012
Towards a robust and trustworthy machine learning system development: An engineering perspective
P Xiong, S Buffett, S Iqbal, P Lamontagne, M Mamun, H Molyneaux
Journal of Information Security and Applications 65, 103121, 2022
142022
Machine learning in precision medicine to preserve privacy via encryption
W Briguglio, P Moghaddam, WA Yousef, I Traoré, M Mamun
Pattern Recognition Letters 151, 148-154, 2021
142021
An optimized signature verification system for vehicle ad hoc network
MSI Mamun, A Miyaji
2012 8th International Conference on Wireless Communications, Networking and …, 2012
142012
Using machine learning for dynamic authentication in telehealth: A tutorial
M Hazratifard, F Gebali, M Mamun
Sensors 22 (19), 7655, 2022
132022
Multifactor Authentication Scheme Using Physically Unclonable Functions
M Fakroon, F Gebali, M Mamun
Internet of Things, 100343, 2020
132020
A multi-purpose group signature for vehicular network security
MSI Mamun, A Miyaji, H Takada
2014 17th international conference on network-based information systems, 511-516, 2014
122014
Privacy-preserving computation offloading for time-series activities classification in ehealthcare
Y Zheng, R Lu, M Mamun
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
102020
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
AF Kabir, MRH Khan, AAMM Haque, MSI Mamun
arXiv preprint arXiv:1208.3769, 2012
102012
Automated detection of unstructured context-dependent sensitive information using deep learning
H Ahmed, I Traore, S Saad, M Mamun
Internet of Things 16, 100444, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20