Ambareen Siraj

According to our database1, Ambareen Siraj authored at least 52 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware.
Int. J. Inf. Sec., February, 2024

2023
Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2021
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.
CoRR, 2021

Avoiding Occupancy Detection From Smart Meter Using Adversarial Machine Learning.
IEEE Access, 2021

Similarity Analysis of Ransomware based on Portable Executable (PE) File Metadata.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Domain Generating Algorithm based Malicious Domains Detection.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

Is there a Security Mindset and Can it be Taught?
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Blockchain Based Farm-to-Fork Supply Chain Tracking.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response.
Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, 2020

2019
Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy.
CoRR, 2019

Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment?.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019

A Protocol Independent Approach in Network Covert Channel Detection.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

CReST-Security Knitting Kit: Readily Available Teaching Resources to Integrate Security Topics into Traditional CS Courses (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Poster Abstract: IoT Platform for Engineering Education and Research (IoT PEER)-Applications in Secure and Smart Manufacturing.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

2017
Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis.
J. Comput. Syst. Sci., 2017

Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Capture the Flag Unplugged: an Offline Cyber Competition.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into Upper Division CS Courses (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

CySCom: Cybersecurity COMics.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Integrating security in the computer science curriculum.
Inroads, 2015

Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2015

Decision Tree Learning for Fraud Detection in Consumer Energy Consumption.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Survey of Crime Analysis and Prediction.
Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, 2015

2014
The rising renaissance engineer spectrum awards (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Empowering faculty to embed security topics into computer science courses.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

Smart grid energy fraud detection using artificial neural networks.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid, 2014

2013
Bringing security into traditional computer science courses: challenges and support (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

Clustering of smart meter data for disaggregation.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Weaving a tapestry: creating a satellite workshop to support HS CS teachers in attracting and engaging students.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

2011
An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

2010
Towards a secure Frequency Monitoring NETwork (FNET) system.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Data fusion for improved situational understanding.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Tracking requirements and threats for secure software development.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2005
A Cognitive Model for Alert Correlation in a Distributed Environment.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture.
Int. J. Inf. Technol. Decis. Mak., 2004

Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003


  Loading...