Quamar Niyaz

According to our database1, Quamar Niyaz authored at least 31 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A GAF and CNN based Wi-Fi Network Intrusion Detection System.
Proceedings of the IEEE INFOCOM 2023, 2023

Impact of Smartphone-Based Interactive Learning Modules on Cybersecurity Learning at the High-School Level.
Proceedings of the IEEE Global Engineering Education Conference, 2023

Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework.
Proceedings of the IEEE Global Engineering Education Conference, 2023

2022
Augmented Reality and Artificial Intelligence in industry: Trends, tools, and future challenges.
Expert Syst. Appl., 2022

Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-Tailored Machine Learning.
IEEE Access, 2022

Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

A Secure Software Engineering Design Framework for Educational Purpose.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

An Early Detection of Android Malware Using System Calls based Machine Learning Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
NATICUSdroid: A malware detection framework for Android using native and custom permissions.
J. Inf. Secur. Appl., 2021

Binary chemical reaction optimization based feature selection techniques for machine learning classification problems.
Expert Syst. Appl., 2021

A Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR Logic.
IEEE Consumer Electron. Mag., 2021

A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Permission-Educator: App for Educating Users About Android Permissions.
Proceedings of the Intelligent Human Computer Interaction, 2021

2020
Practice-Oriented Smartphone Security Exercises for Developing Cybersecurity Mindset in High School Students.
Proceedings of the IEEE International Conference on Teaching, 2020

A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Machine Learning Based Smartphone App for GPS Spoofing Detection.
Proceedings of the Security and Privacy in Communication Networks, 2020

Timestamp-based Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Early Detection of Host-based Intrusions in Linux Environment.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

2019
Security Modeling of Autonomous Systems: A Survey.
ACM Comput. Surv., 2019

Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Identifying Generic Features for Malicious URL Detection System.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

2018
An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS).
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN).
EAI Endorsed Trans. Security Safety, 2017

Normal and anomalous traffic flow pattern analysis for organizational networks.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
A Deep Learning Approach for Network Intrusion Detection System.
EAI Endorsed Trans. Security Safety, 2016

Distributed network traffic feature extraction for a real-time IDS.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

2015
Impact on SDN Powered Network Services Under Adversarial Attacks.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Light VN: A Light-Weight Testbed for Network and Security Experiments.
Proceedings of the 12th International Conference on Information Technology, 2015

2014
Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

2012
Motivation and design of a content distribution architecture for rural areas.
Proceedings of the ACM Annual Symposium on Computing for Development, 2012


  Loading...