Masoom Alam
Orcid: 0000-0001-8839-593X
According to our database1,
Masoom Alam
authored at least 50 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach.
IEEE Access, 2023
2022
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack.
IEEE Access, 2022
2021
IEEE Access, 2021
IEEE Access, 2021
Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks.
IEEE Access, 2021
Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range.
Proceedings of the IEEE Global Engineering Education Conference, 2021
2020
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach.
IEEE Trans. Engineering Management, 2020
IEEE Internet Things J., 2020
2019
J. Parallel Distributed Comput., 2019
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring.
J. Ambient Intell. Humaniz. Comput., 2019
Comput. Networks, 2019
IEEE Access, 2019
2018
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Appl. Intell., 2018
Ann. des Télécommunications, 2018
2017
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017
Comput. Secur., 2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017
Ann. des Télécommunications, 2017
On energy efficiency in underwater wireless sensor networks with cooperative routing.
Ann. des Télécommunications, 2017
IEEE Access, 2017
A Balanced Energy-Consuming and Hole-Alleviating Algorithm for Wireless Sensor Networks.
IEEE Access, 2017
2016
2013
Multim. Tools Appl., 2013
Int. J. Distributed Sens. Networks, 2013
2012
Pers. Ubiquitous Comput., 2012
2011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
2010
Int. J. Web Serv. Res., 2010
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010
2009
Proceedings of the Trusted Computing, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the FIT '09, 2009
Proceedings of the FIT '09, 2009
2008
Model driven security for the realization of dynamic security requirements in collaborative systems.
PhD thesis, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007