Muhammad Mudassar Yamin

Orcid: 0000-0001-5264-7613

According to our database1, Muhammad Mudassar Yamin authored at least 31 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI.
IEEE Access, 2024

2023
A quantitative framework for security assurance evaluation and selection of cloud services: a case study.
Int. J. Inf. Sec., December, 2023

Hybrid IoT Cyber Range.
Sensors, March, 2023

Automatic Verification and Execution of Cyber Attack on IoT Devices.
Sensors, January, 2023

Intelligent Contextualized Network Traffic Generator in a Cyber Range.
Proceedings of the 17th International Conference on Signal-Image Technology & Internet-Based Systems, 2023

Crowd counting using deep learning based head detection.
Proceedings of the Image Processing: Algorithms and Systems XXI, 2023

Cricket Shot Classification using Transformer.
Proceedings of the International Symposium on Image and Signal Processing and Analysis, 2023

Glove-Ing Attention: A Multi-Modal Neural Learning Approach to Image Captioning.
Proceedings of the IEEE International Conference on Acoustics, 2023

Attention Guided Deep Neural Network for Animal Ear Tag Classification in Low-Resolution Images.
Proceedings of the International Conference on Frontiers of Information Technology, 2023

Beyond Theory: Investigating the Practical Feasibility of Confidential Computing.
Proceedings of the International Conference on Frontiers of Information Technology, 2023

Automatic and Realistic Traffic Generation In A Cyber Range.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Data Driven Skill Assessment for Cybersecurity Exercises.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Self-supervised animal detection in constrained environment.
Proceedings of the 34th British Machine Vision Conference Workshop Proceedings, 2023

2022
Use of cyber attack and defense agents in cyber ranges: A case study.
Comput. Secur., 2022

Modeling and executing cyber security exercise scenarios in cyber ranges.
Comput. Secur., 2022

2021
Weaponized AI for cyber attacks.
J. Inf. Secur. Appl., 2021

Serious games as a tool to model attack and defense scenarios for cyber-security exercises.
Comput. Secur., 2021

Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study.
Proceedings of the Augmented Cognition, 2021

Toward AI-Based Scenario Management for Cyber Range Training.
Proceedings of the HCI International 2021 - Late Breaking Papers: Multimodality, eXtended Reality, and Artificial Intelligence, 2021

Ontology-Based Scenario Modeling for Cyber Security Exercise.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Attention-based LSTM Network for Action Recognition in Sports.
Proceedings of the Intelligent Robotics and Industrial Applications using Computer Vision 2021, 2021

2020
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices.
Sensors, 2020

Cyber ranges and security testbeds: Scenarios, functions, tools and architecture.
Comput. Secur., 2020

Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study.
Proceedings of the HCI International 2020 - Late Breaking Papers: Cognition, Learning and Games, 2020

2019
Cyber Weapons Storage Mechanisms.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Mobile device management (MDM) technologies, issues and challenges.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

A Survey of Automated Information Exchange Mechanisms Among CERTs.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

Cyber Security Skill Set Analysis for Common Curricula Development.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Detecting Malicious Windows Commands Using Natural Language Processing Techniques.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain.
Proceedings of the EXplainable AI in Law Workshop co-located with the 31st International Conference on Legal Knowledge and Information Systems, 2018

Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper.
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), 2018


  Loading...