A. S. M. Kayes

Orcid: 0000-0002-2421-2214

According to our database1, A. S. M. Kayes authored at least 64 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adaptive context-aware access control for IoT environments leveraging fog computing.
Int. J. Inf. Sec., August, 2024

Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey.
ACM Comput. Surv., August, 2024

IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks.
Comput. Secur., 2024

A Reinforcement Learning-assisted Evolutionary Computing Approach to Capacitated Vehicle Routing with Time Windows.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

2023
Applying staged event-driven access control to combat ransomware.
Comput. Secur., May, 2023

2022
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions.
ACM Comput. Surv., 2022

A deep learning model for mining and detecting causally related events in tweets.
Concurr. Comput. Pract. Exp., 2022

COVID-19 Rumor Detection Using Psycho-Linguistic Features.
IEEE Access, 2022

Online Recruitment Fraud Detection: A Study on Contextual Features in Australian Job Industries.
IEEE Access, 2022

Spam Email Categorization with NLP and Using Federated Deep Learning.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network.
Sensors, 2021

Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact.
Secur. Commun. Networks, 2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems".
J. Sens. Actuator Networks, 2021

Enforcing situation-aware access control to build malware-resilient file systems.
Future Gener. Comput. Syst., 2021

A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks.
Frontiers Comput. Sci., 2021

Towards Developing a Framework to Analyze the Qualities of the University Websites.
Comput., 2021

Online Judging Platform Utilizing Dynamic Plagiarism Detection Facilities.
Comput., 2021

Dynamic user-centric access control for detection of ransomware attacks.
Comput. Secur., 2021

A Secure Mutual authentication approach to fog computing environment.
Comput. Secur., 2021

IoT-Enabled Smart Energy Grid: Applications and Challenges.
IEEE Access, 2021

An Investigation of Vulnerabilities in Internet of Health Things.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021

2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020

Control Plane Optimisation for an SDN-Based WBAN Framework to Support Healthcare Applications.
Sensors, 2020

ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services.
J. Netw. Comput. Appl., 2020

Cybersecurity data science: an overview from machine learning perspective.
J. Big Data, 2020

Network Traffic Analysis for Threat Detection in the Internet of Things.
IEEE Internet Things Mag., 2020

Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study.
First Monday, 2020

An Empirical Recommendation Framework to Support Location-Based Services.
Future Internet, 2020

Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.
Future Gener. Comput. Syst., 2020

IoT streaming data integration from multiple sources.
Computing, 2020

Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning.
Complex., 2020

CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
Comput. J., 2020

E-MIIM: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management.
AI Soc., 2020

Integration of IoT Streaming Data With Efficient Indexing and Storage Optimization.
IEEE Access, 2020

Inferring Location Types With Geo-Social-Temporal Pattern Mining.
IEEE Access, 2020

A Framework for Measuring IoT Data Quality Based on Freshness Metrics.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Answering Binary Causal Questions: A Transfer Learning Based Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Leveraging Blockchain for Spoof-Resilient Robot Networks.
Proceedings of the Intelligent Robotics and Applications - 13th International Conference, 2020

PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service.
Proceedings of the IEEE International Conference on Informatics, 2020

Responsibility Attribution Against Data Breaches.
Proceedings of the IEEE International Conference on Informatics, 2020

Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
J. Big Data, 2019

Controlling astroturfing on the internet: a survey on detection techniques and research challenges.
Int. J. Web Grid Serv., 2019

This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies.
First Monday, 2019

Context-aware access control with imprecise context characterization for cloud-based data resources.
Future Gener. Comput. Syst., 2019

Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation.
Computing, 2019

A Policy Model and Framework for Context-Aware Access Control to Information Resources†.
Comput. J., 2019

A Comparative Analysis of Distributed Ledger Technology Platforms.
IEEE Access, 2019

Trust Modeling for Blockchain-Based Wearable Data Market.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Dynamic Transitions of States for Context-Sensitive Access Control Decision.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Accessing Data from Multiple Sources Through Context-Aware Access Control.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access Control.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
A Policy Model and Framework for Context-Aware Access Control to Information Resources.
CoRR, 2017

Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

2015
An ontological framework for situation-aware access control of software services.
Inf. Syst., 2015

OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services.
Comput. J., 2015

2014
A Survey on Mining Program-Graph Features for Malware Analysis.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

RelBOSS: A Relationship-Aware Access Control Framework for Software Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
An Ontology-Based Approach to Context-Aware Access Control for Software Services.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

A Semantic Policy Framework for Context-Aware Access Control Applications.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Context-Aware Access Control Framework for Software Services.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

2012
ICAF: A Context-Aware Framework for Access Control.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012


  Loading...