Muhammad Ikram
Orcid: 0000-0003-2113-3390Affiliations:
- Macquarie University, Data61, CSIRO, NSW, Australia
- University of Michigan, Ann Arbor, MI, USA
- Technische Universität Darmstadt, Peer-to-Peer Networks Group, Germany (2010-2013)
- Ajou University, Department of Computer Engineering, Suwon, Korea (2008-2010)
According to our database1,
Muhammad Ikram
authored at least 62 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models.
IEEE Access, 2024
SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
CoRR, 2023
Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19.
IEEE Access, 2023
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
CoRR, 2022
CoRR, 2022
Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study.
CoRR, 2022
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
2021
J. Am. Medical Informatics Assoc., 2021
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures.
ACM Comput. Surv., 2021
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play.
CoRR, 2021
CoRR, 2021
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021
2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CoNEXT'20: Proceedings of the Student Workshop, Barcelona, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
2017
ACM Trans. Priv. Secur., 2017
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
2016
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
2015
2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
2013
2012
Prax. Inf.verarb. Kommun., 2012
2009
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs).
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems.
Proceedings of the 2008 IEEE International Performance, 2008
Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008