Akbar Siami Namin
Orcid: 0000-0002-1646-7495
According to our database1,
Akbar Siami Namin
authored at least 134 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets.
IEEE Access, 2024
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests.
Hum. Factors, March, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles.
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks.
J. Multimodal User Interfaces, 2022
IEEE Access, 2022
ContextMiner: Mining Contextual Features for Conceptualizing Knowledge in Security Texts.
IEEE Access, 2022
Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies.
IEEE Access, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Conceptual Mappings of Conventional Software and Machine Learning-based Applications Development.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Generating Interpretable Features for Context-Aware Document Clustering: A Cybersecurity Case Study.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
J. Inf. Secur. Appl., 2021
Inf. Comput. Secur., 2021
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review.
Int. J. Hum. Comput. Interact., 2021
A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models.
CoRR, 2021
Sal-HMAX: An Enhanced HMAX Model in Conjunction With a Visual Attention Mechanism to Improve Object Recognition Task.
IEEE Access, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021
2020
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals.
ACM Trans. Comput. Educ., 2020
A Concern Analysis of FOMC Statements Comparing The Great Recession and The COVID-19 Pandemic.
CoRR, 2020
Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition.
CoRR, 2020
CoRR, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020
Proceedings of the 7th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
A Concern Analysis of Federal Reserve Statements: The Great Recession vs. The COVID-19 Pandemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
J. Comput. Sci. Technol., 2019
J. Inf. Secur. Appl., 2019
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities.
CoRR, 2019
A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM.
CoRR, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals.
ACM Trans. Comput. Educ., 2018
Int. J. Softw. Eng. Knowl. Eng., 2018
Int. J. Softw. Eng. Knowl. Eng., 2018
What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Smart and Connected Water Resource Management Via Social Media and Community Engagement.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
A Clustering-Based Test Case Classification Technique for Enhancing Regression Testing.
J. Softw., 2017
Int. J. Softw. Eng. Knowl. Eng., 2017
What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the Symposium on Applied Computing, 2017
2016
J. Educ. Technol. Soc., 2016
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016
The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication.
Proceedings of the International Conference on Cyberworlds, 2015
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
Proceedings of the BIOSIG 2015, 2015
2014
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014
The accuracy of user authentication through keystroke features using the most frequent words.
Proceedings of the Cyber and Information Security Research Conference, 2014
Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Identifying Effective Test Cases through K-Means Clustering for Enhancing Regression Testing.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
How Significant is the Effect of Fault Interactions on Coverage-Based Fault Localizations?
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013
Proceedings of the Reliable Software Technologies, 2013
2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2011
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
2010
Proceedings of the Workshop on Future of Software Engineering Research, 2010
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
Proceedings of the 3rd International Workshop on Multicore Software Engineering, 2010
The influence of environmental parameters on concurrency fault exposures: an exploratory study.
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010
2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
2006
IEEE Trans. Software Eng., 2006
Int. J. Netw. Virtual Organisations, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
2004
Proceedings of the Emerging Solutions for Future Manufacturing Systems, 2004