Mohd Anwar

Orcid: 0000-0002-2653-7987

According to our database1, Mohd Anwar authored at least 68 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model.
IEEE Access, 2023

2022
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings.
J. Comput. Inf. Syst., September, 2022

Survey of Supervised Learning for Medical Image Processing.
SN Comput. Sci., 2022

Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?
Secur. Priv., 2022

A Digital Communication Twin for Addressing Misinformation: Vision, Challenges, Opportunities.
IEEE Internet Comput., 2022

Privacy Threats on the Internet of Medical Things.
CoRR, 2022

Inclusive Privacy Design for Older Adults Living in Ambient Assisted Living.
CoRR, 2022

Mitigating shortage of labeled data using clustering-based active learning with diversity exploration.
CoRR, 2022

An Automated Security Concerns Recommender Based on Use Case Specification Ontology.
Autom. Softw. Eng., 2022

A clustering-based active learning method to query informative and representative samples.
Appl. Intell., 2022

Learning Programming in Social Media: An NLP-powered Reddit Study.
Proceedings of the Fourth International Conference on Transdisciplinary AI, 2022

Data-driven Assessment of Dementia Caregivers' Burden: One size does not fit all.
Proceedings of the Fourth International Conference on Transdisciplinary AI, 2022

Characterizing Coding Style of Phishing Websites Using Machine Learning Techniques.
Proceedings of the Fourth International Conference on Transdisciplinary AI, 2022

Audio Sentiment Analysis using Spectrogram and Bag-of- Visual- Words.
Proceedings of the 23rd IEEE International Conference on Information Reuse and Integration for Data Science, 2022

Monkeypox At-a-glance from Google Trends and Reddit.
Proceedings of the IEEE/ACM Conference on Connected Health: Applications, 2022

An Early Detection of Oral Epithelial Dysplasia Based on GoogLeNet Inception-v3.
Proceedings of the IEEE/ACM Conference on Connected Health: Applications, 2022

2021
Monitoring COVID-19 pandemic through the lens of social media using natural language processing and machine learning.
Health Inf. Sci. Syst., December, 2021

Data-Driven Forecasting of Agitation for Persons with Dementia: A Deep Learning-Based Approach.
SN Comput. Sci., 2021

Multi-label classification with local pairwise and high-order label correlations using graph partitioning.
Knowl. Based Syst., 2021

Music Embedding: A Tool for Incorporating Music Theory into Computational Music Applications.
CoRR, 2021

Supporting Privacy, Trust, and Personalization in Online Learning.
Int. J. Artif. Intell. Educ., 2021

Passive User Identification and Authentication with Smartphone Sensor Data.
Proceedings of the Third International Conference on Transdisciplinary AI, 2021

Identification of Ransomware families by Analyzing Network Traffic Using Machine Learning Techniques.
Proceedings of the Third International Conference on Transdisciplinary AI, 2021

Interpreting Keystrokes to Ascertain Human Mood.
Proceedings of the Third International Conference on Transdisciplinary AI, 2021

API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

A Study on Online Businesses' Commitment to Consumer Privacy.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

An effective action covering for multi-label learning classifier systems: a graph-theoretic approach.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Surveillance of COVID-19 pandemic using social media: a reddit study in North Carolina.
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021

2020
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study.
IEEE Internet Things J., 2020

Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0.
Int. J. Prod. Res., 2020

Toward Data-Driven Assessment of Caregiver's Burden for Persons with Dementia using Machine Learning Models.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

Awareness and Working Knowledge of Secure Design Principles: A User Study.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior.
Int. J. Inf. Manag., 2019

Detecting Exploit Websites Using Browser-based Predictive Analytics.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

The Automatic Detection of Sensitive Data in Smart Homes.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Grid Authentication: A Memorability and User Sentiment Study.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Effects of Evidence-Based Malware Cybersecurity Training on Employees.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Extended Abstract: Ethical and Privacy Considerations in Cybersecurity.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Activity Detection and Analysis Using Smartphone Sensors.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

2017
Privacy and Territoriality Issues in an Online Social Learning Portal.
Int. J. Inf. Secur. Priv., 2017

An artificial immunity approach to malware detection in a mobile platform.
EURASIP J. Inf. Secur., 2017

Gender difference and employees' cybersecurity behaviors.
Comput. Hum. Behav., 2017

Zen_Space: A Smartphone App for Individually Tailored Stress Management Support for College Students.
Proceedings of the Smart Health - International Conference, 2017

Grid Framework to Address Password Memorability Issues and Offline Password Attacks.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
A Method for Developing Abuse Cases and Its Evaluation.
J. Softw., 2016

Early Scenario Pruning for Efficient Design Space Exploration in Physical Synthesis.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016

Detection of Mobile Malware: An Artificial Immunity Approach.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Intrusion Detection Using a Multiple-Detector Set Artificial Immune System.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

An Evolutionary General Regression Neural Network Classifier for Intrusion Detection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Employment status and cybersecurity behaviors.
Proceedings of the 2016 International Conference on Behavioral, 2016

2015
Automatic evaluation of information provider reliability and expertise.
World Wide Web, 2015

A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Linking Obesity and Tweets.
Proceedings of the Smart Health - International Conference, 2015

Access Control for Multi-tenancy in Cloud-Based Health Information Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Security Behavior Model of Employees in Cyberspace.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Leveraging online social media for capturing observations of daily living and ecological momentary assessment.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study.
Proceedings of the Enterprise Systems Conference, 2014

2013
Mutual-friend based attacks in social network systems.
Comput. Secur., 2013

Design and Analysis of a Novel Noise Cancelling Topology for Common Gate UWB LNAs.
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013

Kalico: A Smartphone Application for Health-Smart Menu Selection within a Budget.
Proceedings of the Smart Health - International Conference, 2013

2012
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

2011
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Self Learning VLSI Lab along with Web-Based Platform to Design Schematics and Layouts.
Proceedings of the 2011 IEEE International Conference on Technology for Education, 2011

A trust-based approach against IP-spoofing attacks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Simulating the effect of privacy concerns in online social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A trust-based approach to mitigate rerouting attacks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011


  Loading...