Akbar Siami Namin

Orcid: 0000-0002-1646-7495

According to our database1, Akbar Siami Namin authored at least 128 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests.
Hum. Factors, March, 2023

The Application of the BERT Transformer Model for Phishing Email Classification.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Dynamic Analysis for Detection of Self-Destructive Smart Contracts.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Survey on Blockchain-Based Federated Learning and Data Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles.
Proceedings of the IEEE International Conference on Big Data, 2023

The Performance of Machine and Deep Learning Algorithms in Detecting Fake Reviews.
Proceedings of the IEEE International Conference on Big Data, 2023

Detecting Phishing URLs using the BERT Transformer Model.
Proceedings of the IEEE International Conference on Big Data, 2023

Dynamic Analysis for the Detection of Locked Ether Smart Contracts.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks.
J. Multimodal User Interfaces, 2022

How do non experts think about cyber attack consequences?
Inf. Comput. Secur., 2022

MalView: Interactive Visual Analytics for Comprehending Malware Behavior.
IEEE Access, 2022

ContextMiner: Mining Contextual Features for Conceptualizing Knowledge in Security Texts.
IEEE Access, 2022

Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies.
IEEE Access, 2022

A user-centric threat model and repository for cyber attacks.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Can We Predict Consequences of Cyber Attacks?
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Vulnerability Detection in Smart Contracts Using Deep Learning.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Conceptual Mappings of Conventional Software and Machine Learning-based Applications Development.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Using Transformers for Identification of Persuasion Principles in Phishing Emails.
Proceedings of the IEEE International Conference on Big Data, 2022

Generating Interpretable Features for Context-Aware Document Clustering: A Cybersecurity Case Study.
Proceedings of the IEEE International Conference on Big Data, 2022

Solar Irradiance Prediction Using Transformer-based Machine Learning Models.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A fuzzy Dempster-Shafer classifier for detecting Web spams.
J. Inf. Secur. Appl., 2021

How social engineers use persuasion principles during vishing attacks.
Inf. Comput. Secur., 2021

Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review.
Int. J. Hum. Comput. Interact., 2021

A Survey on the Applications of Blockchains in Security of IoT Systems.
CoRR, 2021

A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models.
CoRR, 2021

Sal-HMAX: An Enhanced HMAX Model in Conjunction With a Visual Attention Mechanism to Improve Object Recognition Task.
IEEE Access, 2021

Attack Prediction using Hidden Markov Model.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

A Comparison of TCN and LSTM Models in Detecting Anomalies in Time Series Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021

2020
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals.
ACM Trans. Comput. Educ., 2020

Phishing Detection through Email Embeddings.
CoRR, 2020

A Survey on Vulnerabilities of Ethereum Smart Contracts.
CoRR, 2020

A Concern Analysis of FOMC Statements Comparing The Great Recession and The COVID-19 Pandemic.
CoRR, 2020

Cyber-Attack Consequence Prediction.
CoRR, 2020

Fake Reviews Detection through Analysis of Linguistic Features.
CoRR, 2020

Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition.
CoRR, 2020

Vulnerability Coverage as an Adequacy Testing Criterion.
CoRR, 2020

Detection of Coincidentally Correct Test Cases through Random Forests.
CoRR, 2020

Vulnerability Coverage for Secure Configuration.
CoRR, 2020

Cloud as an Attack Platform.
CoRR, 2020

Fake Reviews Detection through Ensemble Learning.
CoRR, 2020

Launching Stealth Attacks using Cloud.
CoRR, 2020

Clustering Time Series Data through Autoencoder-based Deep Learning Models.
CoRR, 2020

Vulnerability coverage for adequacy security testing.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Optimizing CNN using Fast Fourier Transformation for Object Recognition.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Linguistic Features for Detecting Fake Reviews.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Towards Variability-Aware Legal-GRL Framework for Modeling Compliance Requirements.
Proceedings of the 7th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2020

Compliance Requirements Checking in Variable Environments.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Ensemble Learning for Detecting Fake Reviews.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Evolutionary Algorithms for Vulnerability Coverage.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Cloud: A Platform to Launch Stealth Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Abuse of the Cloud as an Attack Platform.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

A Concern Analysis of Federal Reserve Statements: The Great Recession vs. The COVID-19 Pandemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Email Embeddings for Phishing Detection.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Predicting Consequences of Cyber-Attacks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Predicting Emotions Perceived from Sounds.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Survey on the Moving Target Defense Strategies: An Architectural Perspective.
J. Comput. Sci. Technol., 2019

Modeling adaptive access control policies using answer set programming.
J. Inf. Secur. Appl., 2019

The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities.
CoRR, 2019

A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM.
CoRR, 2019

Markov Decision Process to Enforce Moving Target Defence Policies.
CoRR, 2019

Deep Reinforcement Learning for Detecting Malicious Websites.
CoRR, 2019

TestLocal: just-in-time parametrized testing of local variables.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Enforcing Optimal Moving Target Defense Policies.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Detecting Phishing Websites through Deep Reinforcement Learning.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

The Performance of LSTM and BiLSTM in Forecasting Time Series.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals.
ACM Trans. Comput. Educ., 2018

Testing Multi-Threaded Applications Using Answer Set Programming.
Int. J. Softw. Eng. Knowl. Eng., 2018

Assessing the Effectiveness of Coverage-Based Fault Localizations Using Mutants.
Int. J. Softw. Eng. Knowl. Eng., 2018

The Sounds of Cyber Threats.
CoRR, 2018

Forecasting Economics and Financial Time Series: ARIMA vs. LSTM.
CoRR, 2018

Continuous Authentications Using Frequent English Terms.
Appl. Artif. Intell., 2018

What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

MalViz: an interactive visualization tool for tracing malware.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

A Comparison of ARIMA and LSTM in Forecasting Time Series.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Detecting Web Spams Using Evidence Theory.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A Markov Decision Process to Determine Optimal Policies in Moving Target.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Defending SDN-based IoT Networks Against DDoS Attacks Using Markov Decision Process.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Survey of Privacy Concerns in Wearable Devices.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Evidence Fusion for Malicious Bot Detection in IoT.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Smart and Connected Water Resource Management Via Social Media and Community Engagement.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
A Clustering-Based Test Case Classification Technique for Enhancing Regression Testing.
J. Softw., 2017

Fault Localizations Through Feature Selections.
Int. J. Softw. Eng. Knowl. Eng., 2017

What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

A semantic model for action-based adaptive security.
Proceedings of the Symposium on Applied Computing, 2017

2016
Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments.
J. Educ. Technol. Soc., 2016

Early Identification of Vulnerable Software Components via Ensemble Learning.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Adaptive Reasoning in the Presence of Imperfect Security Requirements.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Adaptive Reasoning for Context-Sensitive Access Controls.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Sonifying Internet Security Threats.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
MuRanker: a mutant ranking tool.
Softw. Test. Verification Reliab., 2015

Debugging in Parallel or Sequential: An Empirical Study.
J. Softw., 2015

Poster: Reasoning Based on Imperfect Context Data in Adaptive Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Statistical Fault Localization Based on Importance Sampling.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Effective User Authentications Using Keystroke Dynamics Based on Feature Selections.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication.
Proceedings of the International Conference on Cyberworlds, 2015

Keystroke Active Authentications Based on Most Frequently Used Words.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

On Accuracy of Keystroke Authentications Based on Commonly Used English Words.
Proceedings of the BIOSIG 2015, 2015

2014
Feature Selections for Effectively Localizing Faulty Events in GUI Applications.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

The accuracy of user authentication through keystroke features using the most frequent words.
Proceedings of the Cyber and Information Security Research Conference, 2014

Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Identifying Effective Test Cases through K-Means Clustering for Enhancing Regression Testing.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

How Significant is the Effect of Fault Interactions on Coverage-Based Fault Localizations?
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013

Measuring the Odds of Statements Being Faulty.
Proceedings of the Reliable Software Technologies, 2013

2012
An Energy Model for Applications Running on Multicore Systems.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
The use of mutation in testing experiments and its sensitivity to external threats.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Paraµ - A Partial and Higher-Order Mutation Tool with Concurrency Operators.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

An Evaluation of Mutation and Data-Flow Testing: A Meta-analysis.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2010
Bayesian reasoning for software testing.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Prioritizing Mutation Operators Based on Importance Sampling.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Bayesian methods for data analysis in software engineering.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Predicting multi-core performance: a case study using Solaris containers.
Proceedings of the 3rd International Workshop on Multicore Software Engineering, 2010

The influence of environmental parameters on concurrency fault exposures: an exploratory study.
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010

2009
The influence of size and coverage on test suite effectiveness.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

2008
Sufficient mutation operators for measuring test effectiveness.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

2007
On Sufficiency of Mutants.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

2006
Using Mutation Analysis for Assessing and Comparing Testing Coverage Criteria.
IEEE Trans. Software Eng., 2006

Implementing enterprise collaboration using web services and software agents.
Int. J. Netw. Virtual Organisations, 2006

An Efficient Trust Model for Multi-Agent Systems.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Applying secret sharing schemes to service reputation.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

2004
Web Services/Agent-Based Model for Inter-Enterprise Collaboration.
Proceedings of the Emerging Solutions for Future Manufacturing Systems, 2004


  Loading...