Follow
Mohammad Mamun
Title
Cited by
Cited by
Year
Characterization of Encrypted and VPN Traffic Using Time-Related Features
G Gerard, Drapper, Arash, Habibi, Ali
ICISSP 2016, 407-414, 2016
913*2016
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
7502017
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
1922016
Intrusion detection system architecture for Wireless Sensor Network
MSI Mamun
The State of the Art in Intrusion Prevention and Detection, 391-406, 2014
177*2014
Hierarchical design based intrusion detection system for wireless ad hoc network
MSI Mamun, AFM Kabir
arXiv preprint arXiv:1208.3772, 2012
802012
CICFlowMeter
AH Lashkari, Y Zang, G Owhuo, M Mamun, G Gil
GitHub.[vid. 2021-08-10]. Dostupné z: https://github. com/ahlashkari …, 2017
392017
An entropy based encrypted traffic classifier
MSI Mamun, AA Ghorbani, N Stakhanova
Information and Communications Security: 17th International Conference …, 2016
332016
Secure VANET applications with a refined group signature
MSI Mamun, A Miyaji
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
252014
A Secure and Private RFID Authentication Protocol under SLPN Problem
M Mamun, A Miyaji, M Rahman
Network and System Security (NSS 2012), 476-489., 2012
222012
Using machine learning for dynamic authentication in telehealth: A tutorial
M Hazratifard, F Gebali, M Mamun
Sensors 22 (19), 7655, 2022
192022
Machine learning in precision medicine to preserve privacy via encryption
W Briguglio, P Moghaddam, WA Yousef, I Traoré, M Mamun
Pattern Recognition Letters 151, 148-154, 2021
172021
An optimized signature verification system for vehicle ad hoc network
MSI Mamun, A Miyaji
2012 8th International Conference on Wireless Communications, Networking and …, 2012
172012
Multifactor Authentication Scheme Using Physically Unclonable Functions
M Fakroon, F Gebali, M Mamun
Internet of Things, 100343, 2020
162020
Policy based intrusion detection and response system in hierarchical WSN architecture
MSI Mamun, AF Kabir, MS Hossen, MRH Khan
arXiv preprint arXiv:1209.1678, 2012
162012
A privacy-preserving efficient RFID authentication protocol from SLPN assumption
MSI Mamun, A Miyaji
International Journal of Computational Science and Engineering 10 (3), 234-243, 2015
152015
Towards a robust and trustworthy machine learning system development: An engineering perspective
P Xiong, S Buffett, S Iqbal, P Lamontagne, M Mamun, H Molyneaux
Journal of Information Security and Applications 65, 103121, 2022
142022
A multi-purpose group signature for vehicular network security
MSI Mamun, A Miyaji, H Takada
2014 17th international conference on network-based information systems, 511-516, 2014
122014
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning
M Mamun, K Shi
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
112021
Privacy-preserving computation offloading for time-series activities classification in ehealthcare
Y Zheng, R Lu, M Mamun
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
112020
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
AF Kabir, MRH Khan, AAMM Haque, MSI Mamun
arXiv preprint arXiv:1208.3769, 2012
112012
The system can't perform the operation now. Try again later.
Articles 1–20