Mohammad Iftekhar Husain

Orcid: 0000-0002-4110-9577

Affiliations:
  • California State Polytechnic University, Pomona, CA, USA


According to our database1, Mohammad Iftekhar Husain authored at least 17 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

2018
A Decision Support System for Personality Based Phishing Susceptibility Analysis.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Security Analysis of Mobile Money Applications on Android.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2015
Towards building a word similarity dictionary for personality bias classification of phishing email contents.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Covert Botnet Command and Control Using Twitter.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Bidirectional data verification for cloud storage.
J. Netw. Comput. Appl., 2014

2013
Lightweight Reconfigurable Encryption Architecture for Moving Target Defense.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Enabling Wide Area Single System Image Experimentation on the GENI Platform.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

2012
Almost Universal Hash Families are also Storage Enforcing
CoRR, 2012

How to Bypass Verified Boot Security in Chromium OS
CoRR, 2012

PGV: A Storage Enforcing Remote Verification Scheme.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

CD-PHY: Physical layer security in wireless networks through constellation diversity.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Storage Enforcement with Kolmogorov Complexity and List Decoding.
Electron. Colloquium Comput. Complex., 2011

2010
A Simple Cost-Effective Framework for iPhone Forensic Analysis.
Proceedings of the Digital Forensics and Cyber Crime, 2010

2009
iForensics: Forensic Analysis of Instant Messaging on Smart Phones.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2008
A Novel Approach for Security and Robustness in Wireless Embedded Systems.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008


  Loading...