Usman Javed Butt

Orcid: 0000-0002-1703-8756

According to our database1, Usman Javed Butt authored at least 19 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Guardians of the Grid: A Collaborative AI System for DDoS Detection in Autonomous Vehicles Infrastructure.
Inf., 2026

Version-Controlled Decentralized Firmware Integrity Verification With On-Chain Rollback Protection for Cyber-Physical Systems on Ethereum.
Proceedings of the 2026 14th International Symposium on Digital Forensics and Security (ISDFS), 2026

2025
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants.
Int. J. Electron. Secur. Digit. Forensics, 2025

Self-Sovereign Identities and Content Provenance: VeriTrust - A Blockchain-Based Framework for Fake News Detection.
Future Internet, 2025

Assure-exam: A blockchain-based assurance framework for secure and transparent Exam Paper Distribution.
Proceedings of the Annual Computer Security Applications Conference, 2025

Leveraging Large Language Models for Cyberbullying Prediction and Detection: A Multimodal Approach to Proactive Prevention and Policy Support.
Proceedings of the 7th International Conference on AI in Computational Linguistics, 2025

2024
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach.
Inf., 2024

Comprehensive Skin Disease Identification Using Augmented Data and Transfer Learning: Achieving Optimal Accuracy with Sequential Models.
Proceedings of the International Conference on Computer and Applications, 2024

Comprehensive Forecasting of Smart Grid Stability Using Advanced Deep Learning and Machine Learning Models.
Proceedings of the International Conference on Computer and Applications, 2024

2023
Information security policies compliance in a global setting: An employee's perspective.
Comput. Secur., June, 2023

Annotated Pedestrians: A Dataset for Soft Biometrics Estimation for Varying Distances.
IEEE J. Sel. Top. Signal Process., May, 2023

Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus.
CoRR, 2023

A review of SolarWinds attack on Orion platform using persistent threat agents anf techniques for gaining unauthorized access.
CoRR, 2023

Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks.
Algorithms, 2023

Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs.
Proceedings of the 2023 6th International Conference on Information Science and Systems, 2023

2019
Web Accessibility Adoption Framework (WAAF) for Businesses and Web Professionals.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Ransomware Threat and its Impact on SCADA.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2015
Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015


  Loading...