Mohammad Saiful Islam Mamun
Orcid: 0000-0001-8444-8926Affiliations:
- Cybersecurity, National Research Council Canada, Ottawa, ON, Canada
According to our database1,
Mohammad Saiful Islam Mamun
authored at least 46 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Inf. Forensics Secur., 2024
WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data.
Int. J. Appl. Cryptogr., 2024
An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems.
Proceedings of the IEEE International Conference on Communications, 2024
2023
J. Cybersecur. Priv., October, 2023
SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place.
Sensors, August, 2023
Ensemble Siamese Network (ESN) Using ECG Signals for Human Authentication in Smart Healthcare System.
Sensors, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 20th International Conference on Smart Business Technologies, 2023
A Lightweight Mutual Authentication Scheme with Fault Tolerance in Smart Elderly Care System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
Sensors, 2022
Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
Pattern Recognit. Lett., 2021
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021
Internet Things, 2021
Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
J. Inf. Secur. Appl., 2018
Comput. Intell., 2018
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
An efficient batch verification system and its effect in a real time VANET environment.
Secur. Commun. Networks, 2015
Int. J. Comput. Sci. Eng., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Policy based intrusion detection and response system in hierarchical WSN architecture
CoRR, 2012
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information
CoRR, 2012
CoRR, 2012
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
CoRR, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012