Stochastic modeling of IoT botnet spread: A short survey on mobile malware spread modeling A Mahboubi, S Camtepe, K Ansari IEEE access 8, 228818-228830, 2020 | 48 | 2020 |
A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism. J Ferdous, R Islam, A Mahboubi, MZ Islam IEEE Access, 2023 | 47 | 2023 |
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ... Computers & Security, 103754, 2024 | 31 | 2024 |
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts A Mahboubi, S Camtepe, H Morarji IEEE Access 5, 27740-27756, 2017 | 26 | 2017 |
Compcrypt–lightweight ans-based compression and encryption S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ... IEEE Transactions on Information Forensics and Security 16, 3859-3873, 2021 | 25 | 2021 |
Evolving techniques in cyber threat hunting: A systematic review A Mahboubi, K Luong, H Aboutorab, HT Bui, G Jarrad, M Bahutair, ... Journal of Network and Computer Applications, 104004, 2024 | 22 | 2024 |
Reducing USB attack surface: A lightweight authentication and delegation protocol A Mahboubi, S Camtepe, H Morarji 2018 International Conference on Smart Computing and Electronic Enterprise …, 2018 | 7 | 2018 |
The compression optimality of asymmetric numeral systems J Pieprzyk, J Duda, M Pawłowski, S Camtepe, A Mahboubi, P Morawiecki Entropy 25 (4), 672, 2023 | 6 | 2023 |
Using process mining to identify file system metrics impacted by ransomware execution A Mahboubi, K Ansari, S Camtepe International Conference on Mobile, Secure, and Programmable Networking, 57-71, 2020 | 6 | 2020 |
Hybrid service for business contingency plan and recovery service as a disaster recovery framework for cloud computing F Sabbaghi, A Mahboubi, SH Othman Journal of Soft Computing and Decision Support Systems 4 (4), 1-10, 2017 | 6 | 2017 |
Malicious Package Detection using Metadata Information S Halder, M Bewong, A Mahboubi, Y Jiang, MR Islam, MZ Islam, RHL Ip, ... Proceedings of the ACM on Web Conference 2024, 1779-1789, 2024 | 5 | 2024 |
ANS-based compression and encryption with 128-bit security S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ... International Journal of Information Security 21 (5), 1051-1067, 2022 | 5 | 2022 |
AI-based ransomware detection: A comprehensive review J Ferdous, R Islam, A Mahboubi, MZ Islam IEEE Access, 2024 | 4 | 2024 |
Digital immunity module: Preventing unwanted encryption using source coding A Mahboubi, K Ansari, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ... Authorea Preprints, 2022 | 3 | 2022 |
Pseudorandom bit generation with asymmetric numeral systems J Pieprzyk, M Pawlowski, P Morawiecki, A Mahboubi, J Duda, S Camtepe Cryptology ePrint Archive, 2022 | 3 | 2022 |
Discovering Graph Differential Dependencies Y Zhang, S Kwashie, M Bewong, J Hu, A Mahboubi, X Guo, Z Feng Australasian Database Conference, 259-272, 2023 | 2 | 2023 |
Security threats to agricultural artificial intelligence: Position and perspective Y Gao, SA Camtepe, NH Sultan, HT Bui, A Mahboubi, H Aboutorab, ... Computers and Electronics in Agriculture 227, 109557, 2024 | 1 | 2024 |
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting A Mahboubi, K Luong, G Jarrad, S Camtepe, M Bewong, M Bahutair, ... Journal of Network and Computer Applications, 104127, 2025 | | 2025 |
A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks A Mahboubi, HT Bui, H Aboutorab, K Luong, S Camtepe, K Ansari International Conference on Web Information Systems Engineering, 204-215, 2024 | | 2024 |
A Graph-Based Approach for Software Functionality Classification on the Web Y Jiang, M Bewong, A Mahboubi, S Halder, R Islam, MZ Islam, RHL Ip, ... International Conference on Web Information Systems Engineering, 58-73, 2024 | | 2024 |