Masoom Alam

Orcid: 0000-0001-8839-593X

According to our database1, Masoom Alam authored at least 50 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach.
IEEE Access, 2023

2022
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack.
IEEE Access, 2022

2021
OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search.
IEEE Access, 2021

ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map.
IEEE Access, 2021

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks.
IEEE Access, 2021

Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range.
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach.
IEEE Trans. Engineering Management, 2020

Outsourcing IOTA proof-of-work to volunteer public devices.
Secur. Priv., 2020

FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network.
IEEE Internet Things J., 2020

Blockchain-Based Agri-Food Supply Chain: A Complete Solution.
IEEE Access, 2020

2019
Towards augmented proactive cyberthreat intelligence.
J. Parallel Distributed Comput., 2019

Near-miss situation based visual analysis of SIEM rules for real time network security monitoring.
J. Ambient Intell. Humaniz. Comput., 2019

Privacy aware decentralized access control system.
Future Gener. Comput. Syst., 2019

Holistic approach for coupling privacy with safety in VANETs.
Comput. Networks, 2019

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Comput. Networks, 2019

A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.
IEEE Access, 2019

2018
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018

Structures and data preserving homomorphic signatures.
J. Netw. Comput. Appl., 2018

Garbled role-based access control in the cloud.
J. Ambient Intell. Humaniz. Comput., 2018

A thin client friendly trusted execution framework for infrastructure-as-a-service clouds.
Future Gener. Comput. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018

Vector Based Genetic Algorithm to optimize predictive analysis in network security.
Appl. Intell., 2018

Detection of rank attack in routing protocol for Low Power and Lossy Networks.
Ann. des Télécommunications, 2018

2017
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

Towards a set aggregation-based data integrity scheme for smart grids.
Ann. des Télécommunications, 2017

On energy efficiency in underwater wireless sensor networks with cooperative routing.
Ann. des Télécommunications, 2017

Fog Computing Over IoT: A Secure Deployment and Formal Verification.
IEEE Access, 2017

A Balanced Energy-Consuming and Hole-Alleviating Algorithm for Wireless Sensor Networks.
IEEE Access, 2017

2016
Formal Verification of the xDAuth Protocol.
IEEE Trans. Inf. Forensics Secur., 2016

2013
Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013

Secure Actor Directed Localization in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
Analysis of existing remote attestation techniques.
Secur. Commun. Networks, 2012

An Android runtime security policy enforcement framework.
Pers. Ubiquitous Comput., 2012

2011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Serv. Res., 2010

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010

2009
Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009

Scalable Remote Attestation with Privacy Protection.
Proceedings of the Trusted Systems, First International Conference, 2009

Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

SAuthMash: mobile agent based self authorization in mashups.
Proceedings of the FIT '09, 2009

Realizing dynamic behavior attestation for mobile platforms.
Proceedings of the FIT '09, 2009

2008
Model driven security for the realization of dynamic security requirements in collaborative systems.
PhD thesis, 2008

Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
A Model-Driven Framework for Trusted Computing Based Systems.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007


  Loading...