Obserwuj
Muhammad Ejaz Ahmed
Muhammad Ejaz Ahmed
CSIRO's Data61
Zweryfikowany adres z data61.csiro.au
Tytuł
Cytowane przez
Cytowane przez
Rok
DDoS attack mitigation in Internet of Things using software defined networking
ME Ahmed, H Kim
2017 IEEE third international conference on big data computing service and …, 2017
1132017
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020
992020
Statistical application fingerprinting for DDoS attack mitigation
ME Ahmed, S Ullah, H Kim
IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018
932018
Transformer-based language models for software vulnerability detection
C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
882022
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking
ME Ahmed, H Kim, M Park
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 11-16, 2017
732017
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
622021
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
392017
Peeler: Profiling kernel-level events to detect ransomware
ME Ahmed, H Kim, S Camtepe, S Nepal
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
382021
Vuldebert: A vulnerability detection system using bert
S Kim, J Choi, ME Ahmed, S Nepal, H Kim
2022 IEEE International Symposium on Software Reliability Engineering …, 2022
362022
Energy-arrival-aware detection threshold in wireless-powered cognitive radio networks
ME Ahmed, DI Kim, JY Kim, Y Shin
IEEE Transactions on Vehicular Technology 66 (10), 9201-9213, 2017
292017
Sensing-transmission edifice using bayesian nonparametric traffic clustering in cognitive radio networks
ME Ahmed, JB Song, Z Han, DY Suh
IEEE Transactions on Mobile Computing 13 (9), 2141-2155, 2013
222013
Resource optimization scheme for multimedia-enabled wireless mesh networks
A Ali, ME Ahmed, MJ Piran, DY Suh
Sensors 14 (8), 14500-14525, 2014
212014
Evolving techniques in cyber threat hunting: A systematic review
A Mahboubi, K Luong, H Aboutorab, HT Bui, G Jarrad, M Bahutair, ...
Journal of Network and Computer Applications, 104004, 2024
192024
Traffic-aware optimal spectral access in wireless powered cognitive radio networks
ME Ahmed, DI Kim, KW Choi
IEEE Transactions on Mobile Computing 17 (3), 733-745, 2017
172017
Medusa: Malware detection using statistical analysis of system's behavior
ME Ahmed, S Nepal, H Kim
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
162018
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks
ME Ahmed, JB Song, Z Han
2014 IEEE Global Communications Conference, 999-1004, 2014
152014
Decamouflage: A framework to detect image-scaling attacks on CNN
B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
14*2021
Optimal spectrum sensing policy in RF-powered cognitive radio networks
HS Lee, ME Ahmed, DI Kim
IEEE Transactions on Vehicular Technology 67 (10), 9557-9570, 2018
142018
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks
ME Ahmed, JB Song, NT Nguyen, Z Han
2012 IEEE International Conference on Communications (ICC), 1586-1591, 2012
142012
Transformer-based language models for software vulnerability detection: Performance, model's security and platforms
C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal
CoRR, 2022
122022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20