Ambareen Siraj
According to our database1,
Ambareen Siraj
authored at least 52 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware.
Int. J. Inf. Sec., February, 2024
2023
Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023
2021
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.
CoRR, 2021
IEEE Access, 2021
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning.
Proceedings of the SAT-CPS@CODASPY 2021, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020
Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response.
Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, 2020
2019
Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy.
CoRR, 2019
Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment?.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
2018
AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
CReST-Security Knitting Kit: Readily Available Teaching Resources to Integrate Security Topics into Traditional CS Courses (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Poster Abstract: IoT Platform for Engineering Education and Research (IoT PEER)-Applications in Secure and Smart Manufacturing.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
2017
Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis.
J. Comput. Syst. Sci., 2017
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
2016
CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into Upper Division CS Courses (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2015
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, 2015
2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid, 2014
2013
Bringing security into traditional computer science courses: challenges and support (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
2012
Weaving a tapestry: creating a satellite workshop to support HS CS teachers in attracting and engaging students.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
2011
An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011
2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
2008
Proceedings of the 46th Annual Southeast Regional Conference, 2008
2007
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
2005
Proceedings of the Intelligence and Security Informatics, 2005
2004
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture.
Int. J. Inf. Technol. Decis. Mak., 2004
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003