متابعة
Arash Mahboubi
Arash Mahboubi
بريد إلكتروني تم التحقق منه على csu.edu.au
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Stochastic modeling of IoT botnet spread: A short survey on mobile malware spread modeling
A Mahboubi, S Camtepe, K Ansari
IEEE access 8, 228818-228830, 2020
492020
A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEE Access, 2023
482023
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ...
Computers & Security, 103754, 2024
312024
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts
A Mahboubi, S Camtepe, H Morarji
IEEE Access 5, 27740-27756, 2017
262017
Compcrypt–lightweight ans-based compression and encryption
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
IEEE Transactions on Information Forensics and Security 16, 3859-3873, 2021
252021
Evolving techniques in cyber threat hunting: A systematic review
A Mahboubi, K Luong, H Aboutorab, HT Bui, G Jarrad, M Bahutair, ...
Journal of Network and Computer Applications, 104004, 2024
232024
Reducing USB attack surface: A lightweight authentication and delegation protocol
A Mahboubi, S Camtepe, H Morarji
2018 International Conference on Smart Computing and Electronic Enterprise …, 2018
72018
The compression optimality of asymmetric numeral systems
J Pieprzyk, J Duda, M Pawłowski, S Camtepe, A Mahboubi, P Morawiecki
Entropy 25 (4), 672, 2023
62023
Using process mining to identify file system metrics impacted by ransomware execution
A Mahboubi, K Ansari, S Camtepe
International Conference on Mobile, Secure, and Programmable Networking, 57-71, 2020
62020
Hybrid service for business contingency plan and recovery service as a disaster recovery framework for cloud computing
F Sabbaghi, A Mahboubi, SH Othman
Journal of Soft Computing and Decision Support Systems 4 (4), 1-10, 2017
62017
AI-based ransomware detection: A comprehensive review
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEE Access, 2024
52024
Malicious Package Detection using Metadata Information
S Halder, M Bewong, A Mahboubi, Y Jiang, MR Islam, MZ Islam, RHL Ip, ...
Proceedings of the ACM on Web Conference 2024, 1779-1789, 2024
52024
ANS-based compression and encryption with 128-bit security
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
International Journal of Information Security 21 (5), 1051-1067, 2022
52022
Digital immunity module: Preventing unwanted encryption using source coding
A Mahboubi, K Ansari, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ...
Authorea Preprints, 2022
32022
Pseudorandom bit generation with asymmetric numeral systems
J Pieprzyk, M Pawlowski, P Morawiecki, A Mahboubi, J Duda, S Camtepe
Cryptology ePrint Archive, 2022
32022
Discovering Graph Differential Dependencies
Y Zhang, S Kwashie, M Bewong, J Hu, A Mahboubi, X Guo, Z Feng
Australasian Database Conference, 259-272, 2023
22023
Security threats to agricultural artificial intelligence: Position and perspective
Y Gao, SA Camtepe, NH Sultan, HT Bui, A Mahboubi, H Aboutorab, ...
Computers and Electronics in Agriculture 227, 109557, 2024
12024
RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning
NH Sultan, Y Bo, Y Gao, S Camtepe, A Mahboubi, HT Bui, A Chauhan, ...
arXiv preprint arXiv:2502.08989, 2025
2025
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting
A Mahboubi, K Luong, G Jarrad, S Camtepe, M Bewong, M Bahutair, ...
Journal of Network and Computer Applications, 104127, 2025
2025
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
J Ferdous, R Islam, A Mahboubi, MZ Islam
Sensors 25 (4), 1153, 2025
2025
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20