Shahrear Iqbal

Orcid: 0000-0001-7819-5715

Affiliations:
  • National Research Council (NRC) of Canada, Fredericton, NB, Canada


According to our database1, Shahrear Iqbal authored at least 30 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security.
ACM Comput. Surv., February, 2024

Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems.
CoRR, 2024

2023
Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
Peer Peer Netw. Appl., May, 2023

LogShield: A Transformer-based APT Detection System Leveraging Self-Attention.
CoRR, 2023

Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective.
Proceedings of the IEEE International Conference on Digital Health, 2023

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022

ANUBIS: a provenance graph-based framework for advanced persistent threat detection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Towards a Robust and Trustworthy Machine Learning System Development.
CoRR, 2021

Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

A Framework for Secure Logging in Precision Healthcare Cloud-based Services.
Proceedings of the IEEE International Conference on Digital Health, 2021

A feature exploration approach for IoT attack type classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A Study on UAV Operating System Security and Future Research Challenges.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Verification Based Scheme to Restrict IoT Attacks.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2020
A classification of attacks to In-Vehicle Components (IVCs).
Veh. Commun., 2020

2019
Towards a Security Architecture for Protecting Connected Vehicles from Malware.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Securing Vehicle ECU Communications and Stored Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Protecting Internet users from becoming victimized attackers of click-fraud.
J. Softw. Evol. Process., 2018

SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques.
Proceedings of the International Conference on Software Security and Assurance, 2018

Securing Web Applications with Secure Coding Practices and Integrity Verification.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Towards A Security Framework for Smartphone Operating Systems.
PhD thesis, 2017

Flamingo: a framework for smartphone security context management.
Proceedings of the Symposium on Applied Computing, 2017

Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts.
Proceedings of the Information Security - 20th International Conference, 2017

2016
SAM: A secure anti-malware framework for the smartphone operating systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Zonedroid: control your droid through application zoning.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

FCFraud: Fighting Click-Fraud from the User Side.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

2010
Solving the Multi-dimensional Multi-choice Knapsack Problem with the Help of Ants.
Proceedings of the Swarm Intelligence - 7th International Conference, 2010


  Loading...