Följ
Arash Mahboubi
Titel
Citeras av
Citeras av
År
Stochastic modeling of IoT botnet spread: A short survey on mobile malware spread modeling
A Mahboubi, S Camtepe, K Ansari
IEEE access 8, 228818-228830, 2020
482020
A review of state-of-the-art malware attack trends and defense mechanisms
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEe Access 11, 121118-121141, 2023
472023
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ...
Computers & Security 140, 103754, 2024
312024
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts
A Mahboubi, S Camtepe, H Morarji
IEEE Access 5, 27740-27756, 2017
272017
Compcrypt–lightweight ANS-based compression and encryption
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
IEEE Transactions on Information Forensics and Security 16, 3859-3873, 2021
252021
Evolving techniques in cyber threat hunting: A systematic review
A Mahboubi, K Luong, H Aboutorab, HT Bui, G Jarrad, M Bahutair, ...
Journal of Network and Computer Applications, 104004, 2024
232024
Reducing USB attack surface: A lightweight authentication and delegation protocol
A Mahboubi, S Camtepe, H Morarji
2018 International Conference on Smart Computing and Electronic Enterprise …, 2018
72018
The compression optimality of asymmetric numeral systems
J Pieprzyk, J Duda, M Pawłowski, S Camtepe, A Mahboubi, P Morawiecki
Entropy 25 (4), 672, 2023
62023
Using process mining to identify file system metrics impacted by ransomware execution
A Mahboubi, K Ansari, S Camtepe
International Conference on Mobile, Secure, and Programmable Networking, 57-71, 2020
62020
Hybrid service for business contingency plan and recovery service as a disaster recovery framework for cloud computing
F Sabbaghi, A Mahboubi, SH Othman
Journal of Soft Computing and Decision Support Systems 4 (4), 1-10, 2017
62017
AI-based ransomware detection: A comprehensive review
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEE Access, 2024
52024
Malicious package detection using metadata information
S Halder, M Bewong, A Mahboubi, Y Jiang, MR Islam, MZ Islam, RHL Ip, ...
Proceedings of the ACM Web Conference 2024, 1779-1789, 2024
52024
ANS-based compression and encryption with 128-bit security
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
International Journal of Information Security 21 (5), 1051-1067, 2022
52022
Digital immunity module: Preventing unwanted encryption using source coding
A Mahboubi, K Ansari, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ...
Authorea Preprints, 2022
32022
Pseudorandom bit generation with asymmetric numeral systems
J Pieprzyk, M Pawlowski, P Morawiecki, A Mahboubi, J Duda, S Camtepe
Cryptology ePrint Archive, 2022
32022
Discovering graph differential dependencies
Y Zhang, S Kwashie, M Bewong, J Hu, A Mahboubi, X Guo, Z Feng
Australasian Database Conference, 259-272, 2023
22023
Security threats to agricultural artificial intelligence: Position and perspective
Y Gao, SA Camtepe, NH Sultan, HT Bui, A Mahboubi, H Aboutorab, ...
Computers and Electronics in Agriculture 227, 109557, 2024
12024
RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning
NH Sultan, Y Bo, Y Gao, S Camtepe, A Mahboubi, HT Bui, A Chauhan, ...
arXiv preprint arXiv:2502.08989, 2025
2025
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting
A Mahboubi, K Luong, G Jarrad, S Camtepe, M Bewong, M Bahutair, ...
Journal of Network and Computer Applications, 104127, 2025
2025
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
J Ferdous, R Islam, A Mahboubi, MZ Islam
Sensors 25 (4), 1153, 2025
2025
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20