Stochastic modeling of IoT botnet spread: A short survey on mobile malware spread modeling A Mahboubi, S Camtepe, K Ansari IEEE access 8, 228818-228830, 2020 | 30 | 2020 |
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts A Mahboubi, S Camtepe, H Morarji IEEE Access 5, 27740-27756, 2017 | 21 | 2017 |
Compcrypt–lightweight ans-based compression and encryption S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ... IEEE Transactions on Information Forensics and Security 16, 3859-3873, 2021 | 19 | 2021 |
Reducing USB attack surface: A lightweight authentication and delegation protocol A Mahboubi, S Camtepe, H Morarji 2018 International Conference on Smart Computing and Electronic Enterprise …, 2018 | 6 | 2018 |
Hybrid service for business contingency plan and recovery service as a disaster recovery framework for cloud computing F Sabbaghi, A Mahboubi, SH Othman Journal of Soft Computing and Decision Support Systems 4 (4), 1-10, 2017 | 5 | 2017 |
A review of state-of-the-art malware attack trends and defense mechanisms J Ferdous, R Islam, A Mahboubi, MZ Islam IEEE Access 11, 121118-121141, 2023 | 3 | 2023 |
Using process mining to identify file system metrics impacted by ransomware execution A Mahboubi, K Ansari, S Camtepe International Conference on Mobile, Secure, and Programmable Networking, 57-71, 2020 | 3 | 2020 |
Digital immunity module: Preventing unwanted encryption using source coding A Mahboubi, K Ansari, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ... Authorea Preprints, 2023 | 2 | 2023 |
The compression optimality of asymmetric numeral systems J Pieprzyk, J Duda, M Pawłowski, S Camtepe, A Mahboubi, P Morawiecki Entropy 25 (4), 672, 2023 | 2 | 2023 |
ANS-based compression and encryption with 128-bit security S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ... International Journal of Information Security 21 (5), 1051-1067, 2022 | 2 | 2022 |
Pseudorandom bit generation with asymmetric numeral systems J Pieprzyk, M Pawlowski, P Morawiecki, A Mahboubi, J Duda, S Camtepe Cryptology ePrint Archive, 2022 | 1 | 2022 |
Malicious Package Detection using Metadata Information S Halder, M Bewong, A Mahboubi, Y Jiang, R Islam, Z Islam, R Ip, ... arXiv preprint arXiv:2402.07444, 2024 | | 2024 |
Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ... Computers & Security, 103754, 2024 | | 2024 |
Discovering Graph Differential Dependencies Y Zhang, S Kwashie, M Bewong, J Hu, A Mahboubi, X Guo, Z Feng Australasian Database Conference, 259-272, 2023 | | 2023 |
A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism. J Ferdous, R Islam, A Mahboubi, MZ Islam IEEE Access, 2023 | | 2023 |
Digital Immunity Module: Preventing Unwanted Encryption Digital Immunity Module: Preventing Unwanted Encryption using Source Coding using Source Coding Digital Immunity Module … K Ansari, A Mahboubi, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ... TechRxiv 8, 2022 | | 2022 |
Security of critical information infrastructures exposed to mobile personal devices A Mahboubi Queensland University of Technology, 2018 | | 2018 |