Masood Mansoori

Orcid: 0000-0002-6412-2053

According to our database1, Masood Mansoori authored at least 18 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Autoencoder-based feature construction for IoT attacks clustering.
Future Gener. Comput. Syst., 2022

Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599].
Comput. Secur., 2022

Probabilistic modelling of deception-based security framework using markov decision process.
Comput. Secur., 2022

Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection.
Appl. Soft Comput., 2022

2021
Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

2020
How do they find us? A study of geolocation tracking techniques of malicious web sites.
Comput. Secur., 2020

A Measurement Study of IoT-Based Attacks Using IoT Kill Chain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

IoT Attacks: Features Identification and Clustering.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Geolocation Tracking and Cloaking of Malicious Web Sites.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

2017
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.
PhD thesis, 2017

2016
Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Machine Learning Based Web Spam Filtering Approach.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Measurement of IP and network tracking behaviour of malicious websites.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2014
YALIH, Yet Another Low Interaction Honeyclient.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Improving exposure of intrusion deception system through implementation of hybrid honeypot.
Int. Arab J. Inf. Technol., 2012

A hybrid recognition and recall based approach in graphical passwords.
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012


  Loading...