Baber Aslam

According to our database1, Baber Aslam authored at least 28 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks.
Int. J. Inf. Sec., August, 2024

2023
Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

2022
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling.
J. Netw. Comput. Appl., 2022

A deep learning assisted personalized deception system for countering web application attacks.
J. Inf. Secur. Appl., 2022

An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2017
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Syst., 2017

2016
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks.
Wirel. Networks, 2016

2015
Analysis of Peer-to-Peer Botnet Attacks and Defenses.
Proceedings of the Propagation Phenomena in Real World Networks, 2015

A comparison of windows physical memory acquisition tools.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Criteria for Validating Secure Wiping Tools.
Proceedings of the Advances in Digital Forensics XI, 2015

Uncovering Self Code Modification in Android.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2013
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support.
Secur. Commun. Networks, 2013

Extension of internet access to VANET via satellite receive-only terminals.
Int. J. Ad Hoc Ubiquitous Comput., 2013

PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Transparent cross-layer solutions for throughput boost in Cognitive Radio Networks.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Optimal roadside units placement in urban areas for vehicular networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2011
Long-term reputation system for vehicular networking based on vehicle's daily commute routine.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Optimal roadside units placement along highways.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

One-way-linkable blind signature security architecture for VANET.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Peer-to-Peer Botnets.
Proceedings of the Handbook of Information and Communication Security, 2010

Secure traffic data propagation in Vehicular Ad Hoc Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2009
A Systematic Study on Peer-to-Peer Botnets.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Empowered Certification Authority in VANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009


  Loading...