Mir Mehedi Ahsan Pritom

Orcid: 0000-0002-1260-1829

Affiliations:
  • University of North Carolina at Charlotte, USA


According to our database1, Mir Mehedi Ahsan Pritom authored at least 14 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes.
CoRR, 2024

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management.
Proceedings of the IEEE International Conference on Blockchain, 2024

2022
Blockchain-based automated and robust cyber security management.
J. Parallel Distributed Comput., 2022

Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Case Study on Detecting COVID-19 Health-Related Misinformation in Social Media.
CoRR, 2021

2020
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2017
Predicting Zero-day Malicious IP Addresses.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

A Study on Log Analysis Approaches Using Sandia Dataset.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2015
A Multiconstrained QoS Aware MAC Protocol for Cluster-Based Cognitive Radio Sensor Networks.
Int. J. Distributed Sens. Networks, 2015


  Loading...