Arash Mahboubi

Orcid: 0000-0002-0487-0615

According to our database1, Arash Mahboubi authored at least 17 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evolving techniques in cyber threat hunting: A systematic review.
J. Netw. Comput. Appl., 2024

Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
J. Inf. Secur. Appl., 2024

Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024

AI-Based Ransomware Detection: A Comprehensive Review.
IEEE Access, 2024

Malicious Package Detection using Metadata Information.
Proceedings of the ACM on Web Conference 2024, 2024

A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

A Graph-Based Approach for Software Functionality Classification on the Web.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Proceedings of the Advances in Information and Computer Security, 2024

2023
The Compression Optimality of Asymmetric Numeral Systems.
Entropy, April, 2023

A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms.
IEEE Access, 2023

Discovering Graph Differential Dependencies.
Proceedings of the Databases Theory and Applications, 2023

2022
Pseudorandom Bit Generation with Asymmetric Numeral Systems.
IACR Cryptol. ePrint Arch., 2022

2021
Compcrypt-Lightweight ANS-Based Compression and Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

ANS-based Compression and Encryption with 128-bit Security.
IACR Cryptol. ePrint Arch., 2021

2020
Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling.
IEEE Access, 2020

Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

2017
A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts.
IEEE Access, 2017


  Loading...