BibTeX records: Ambareen Siraj

download as .bib file

@article{DBLP:journals/ijisec/AyubSFG24,
  author       = {Md. Ahsan Ayub and
                  Ambareen Siraj and
                  Bobby Filar and
                  Maanak Gupta},
  title        = {RWArmor: a static-informed dynamic analysis approach for early detection
                  of cryptographic windows ransomware},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {533--556},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00758-z},
  doi          = {10.1007/S10207-023-00758-Z},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AyubSFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AyubS23,
  author       = {Md. Ahsan Ayub and
                  Ambareen Siraj},
  title        = {Understanding the Behavior of Ransomware: An {I/O} Request Packet
                  {(IRP)} Driven Study on Ransomware Detection against Execution Time},
  booktitle    = {9th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2023, Atlanta, GA, USA, November 1-4, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CIC58953.2023.00018},
  doi          = {10.1109/CIC58953.2023.00018},
  timestamp    = {Thu, 07 Mar 2024 22:43:57 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AyubS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YilmazS21,
  author       = {Ibrahim Yilmaz and
                  Ambareen Siraj},
  title        = {Avoiding Occupancy Detection From Smart Meter Using Adversarial Machine
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {35411--35430},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3057525},
  doi          = {10.1109/ACCESS.2021.3057525},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YilmazS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/LandS21,
  author       = {Kendall Land and
                  Ambareen Siraj},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Blockchain Based Farm-to-Fork Supply Chain Tracking},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {3416--3425},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671969},
  doi          = {10.1109/BIGDATA52589.2021.9671969},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/LandS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/YilmazKSA21,
  author       = {Ibrahim Yilmaz and
                  Kavish Kapoor and
                  Ambareen Siraj and
                  Mahmoud Abouyoussef},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {Privacy Protection of Grid Users Data with Blockchain and Adversarial
                  Machine Learning},
  booktitle    = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969.3450431},
  doi          = {10.1145/3445969.3450431},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/YilmazKSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SirajSHKKGM21,
  author       = {Ambareen Siraj and
                  Nigamanth Sridhar and
                  John A. Drew Hamilton and
                  Latifur Khan and
                  Siddharth Kaza and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Is there a Security Mindset and Can it be Taught?},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {335--336},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450358},
  doi          = {10.1145/3422337.3450358},
  timestamp    = {Wed, 21 Apr 2021 10:54:09 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SirajSHKKGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/AyubSST21,
  author       = {Md. Ahsan Ayub and
                  Steven Smith and
                  Ambareen Siraj and
                  Paul Tinker},
  title        = {Domain Generating Algorithm based Malicious Domains Detection},
  booktitle    = {8th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2021/7th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28,
                  2021},
  pages        = {77--82},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00024},
  doi          = {10.1109/CSCLOUD-EDGECOM52276.2021.00024},
  timestamp    = {Thu, 05 Aug 2021 09:37:29 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/AyubSST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WeissMHSTKC21,
  author       = {Richard Weiss and
                  Jens Mache and
                  Elizabeth K. Hawthorne and
                  Ambareen Siraj and
                  Blair Taylor and
                  Siddharth Kaza and
                  Ankur Chattopadhyay},
  editor       = {Mark Sherriff and
                  Laurence D. Merkle and
                  Pamela A. Cutter and
                  Alvaro E. Monge and
                  Judithe Sheard},
  title        = {Integrating Hands-on Cybersecurity Exercises into the Curriculum in
                  2021},
  booktitle    = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science
                  Education, Virtual Event, USA, March 13-20, 2021},
  pages        = {1358},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3408877.3439530},
  doi          = {10.1145/3408877.3439530},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/WeissMHSTKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/AyubS21,
  author       = {Md. Ahsan Ayub and
                  Ambareen Siraj},
  title        = {Similarity Analysis of Ransomware based on Portable Executable {(PE)}
                  File Metadata},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021,
                  Orlando, FL, USA, December 5-7, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SSCI50451.2021.9660019},
  doi          = {10.1109/SSCI50451.2021.9660019},
  timestamp    = {Thu, 03 Feb 2022 09:28:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/AyubS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-00521,
  author       = {Ibrahim Yilmaz and
                  Ambareen Siraj and
                  Denis A. Ulybyshev},
  title        = {Improving DGA-Based Malicious Domain Classifiers for Malware Defense
                  with Adversarial Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2101.00521},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.00521},
  eprinttype    = {arXiv},
  eprint       = {2101.00521},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-00521.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-06308,
  author       = {Ibrahim Yilmaz and
                  Kavish Kapoor and
                  Ambareen Siraj and
                  Mahmoud Abouyoussef},
  title        = {Privacy Protection of Grid Users Data with Blockchain and Adversarial
                  Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2101.06308},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.06308},
  eprinttype    = {arXiv},
  eprint       = {2101.06308},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-06308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/IslamEGSR20,
  author       = {Sheikh Rabiul Islam and
                  William Eberle and
                  Sheikh K. Ghafoor and
                  Ambareen Siraj and
                  Mike Rogers},
  editor       = {Andreas Martin and
                  Knut Hinkelmann and
                  Hans{-}Georg Fill and
                  Aurona Gerber and
                  Doug Lenat and
                  Reinhard Stolle and
                  Frank van Harmelen},
  title        = {Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion
                  Detection and Response},
  booktitle    = {Proceedings of the {AAAI} 2020 Spring Symposium on Combining Machine
                  Learning and Knowledge Engineering in Practice, {AAAI-MAKE} 2020,
                  Palo Alto, CA, USA, March 23-25, 2020, Volume {I}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2600},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2600/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:39 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/IslamEGSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/AyubJTS20,
  author       = {Md. Ahsan Ayub and
                  William A. Johnson and
                  Douglas A. Talbert and
                  Ambareen Siraj},
  title        = {Model Evasion Attack on Intrusion Detection Systems using Adversarial
                  Machine Learning},
  booktitle    = {54th Annual Conference on Information Sciences and Systems, {CISS}
                  2020, Princeton, NJ, USA, March 18-20, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CISS48834.2020.1570617116},
  doi          = {10.1109/CISS48834.2020.1570617116},
  timestamp    = {Wed, 20 May 2020 12:05:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/AyubJTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JeziorowskiIS20,
  author       = {Susan Jeziorowski and
                  Muhammad Ismail and
                  Ambareen Siraj},
  editor       = {Rakesh M. Verma and
                  Latifur Khan and
                  Chilukuri K. Mohan},
  title        = {Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata
                  and Image Hashing in Dark Web Marketplaces},
  booktitle    = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop
                  on Security and Privacy Analytics, New Orleans, LA, USA, March 18,
                  2020},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375708.3380311},
  doi          = {10.1145/3375708.3380311},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JeziorowskiIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/YilmazMS20,
  author       = {Ibrahim Yilmaz and
                  Rahat Masum and
                  Ambareen Siraj},
  title        = {Addressing Imbalanced Data Problem with Generative Adversarial Network
                  For Intrusion Detection},
  booktitle    = {21st International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IRI49571.2020.00012},
  doi          = {10.1109/IRI49571.2020.00012},
  timestamp    = {Mon, 21 Sep 2020 16:27:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/YilmazMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AyubCS20,
  author       = {Md. Ahsan Ayub and
                  Andrea Continella and
                  Ambareen Siraj},
  title        = {An {I/O} Request Packet {(IRP)} Driven Effective Ransomware Detection
                  Scheme using Artificial Neural Network},
  booktitle    = {21st International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020},
  pages        = {319--324},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IRI49571.2020.00053},
  doi          = {10.1109/IRI49571.2020.00053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/AyubCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12640,
  author       = {Ibrahim Yilmaz and
                  Ambareen Siraj},
  title        = {Avoiding Occupancy Detection from Smart Meter using Adversarial Machine
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2010.12640},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12640},
  eprinttype    = {arXiv},
  eprint       = {2010.12640},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12640.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/AyubSS19,
  author       = {Md. Ahsan Ayub and
                  Steven Smith and
                  Ambareen Siraj},
  editor       = {Meikang Qiu},
  title        = {A Protocol Independent Approach in Network Covert Channel Detection},
  booktitle    = {2019 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3,
                  2019},
  pages        = {165--170},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSE/EUC.2019.00040},
  doi          = {10.1109/CSE/EUC.2019.00040},
  timestamp    = {Tue, 28 Jan 2020 15:18:52 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/AyubSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mldm/GuoDS19,
  author       = {Terry N. Guo and
                  Animesh Dahal and
                  Ambareen Siraj},
  editor       = {Petra Perner},
  title        = {Precise Feature Selection and Case Study of Intrusion Detection in
                  an Industrial Control System {(ICS)} Environment?},
  booktitle    = {Machine Learning and Data Mining in Pattern Recognition, 15th International
                  Conference on Machine Learning and Data Mining, {MLDM} 2019, New York,
                  NY, USA, July 20-25, 2019, Proceedings, Volume {I}},
  pages        = {319--332},
  publisher    = {ibai Publishing},
  year         = {2019},
  timestamp    = {Sat, 21 Aug 2021 13:54:13 +0200},
  biburl       = {https://dblp.org/rec/conf/mldm/GuoDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09853,
  author       = {Sheikh Rabiul Islam and
                  William Eberle and
                  Sheikh K. Ghafoor and
                  Ambareen Siraj and
                  Mike Rogers},
  title        = {Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion
                  Detection and Response},
  journal      = {CoRR},
  volume       = {abs/1911.09853},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09853},
  eprinttype    = {arXiv},
  eprint       = {1911.09853},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09853.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09858,
  author       = {Sheikh Rabiul Islam and
                  William Eberle and
                  Sheikh K. Ghafoor and
                  Sid C. Bundy and
                  Douglas A. Talbert and
                  Ambareen Siraj},
  title        = {Investigating bankruptcy prediction models in the presence of extreme
                  class imbalance and multiple stages of economy},
  journal      = {CoRR},
  volume       = {abs/1911.09858},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09858},
  eprinttype    = {arXiv},
  eprint       = {1911.09858},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/GuoKCPS18,
  author       = {Terry N. Guo and
                  Damon Khoo and
                  Michael Coultis and
                  Marbin Pazos{-}Revilla and
                  Ambareen Siraj},
  title        = {Poster Abstract: IoT Platform for Engineering Education and Research
                  (IoT PEER)-Applications in Secure and Smart Manufacturing},
  booktitle    = {2018 {IEEE/ACM} Third International Conference on Internet-of-Things
                  Design and Implementation, IoTDI 2018, Orlando, FL, USA, April 17-20,
                  2018},
  pages        = {277--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IoTDI.2018.00038},
  doi          = {10.1109/IOTDI.2018.00038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotdi/GuoKCPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SirajG17,
  author       = {Ambareen Siraj and
                  Sheikh K. Ghafoor},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {CReST-Security Knitting Kit: Readily Available Teaching Resources
                  to Integrate Security Topics into Traditional {CS} Courses (Abstract
                  Only)},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {1058},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3162355},
  doi          = {10.1145/3159450.3162355},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/SirajG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WeissSMTKCL17,
  author       = {Richard Weiss and
                  Ambareen Siraj and
                  Jens Mache and
                  Blair Taylor and
                  Siddharth Kaza and
                  Ankur Chattopadhyay and
                  Michael E. Locasto},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {Integrating Hands-on Cybersecurity Exercises into the Curriculum in
                  2018: (Abstract Only)},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {1070},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3162195},
  doi          = {10.1145/3159450.3162195},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/WeissSMTKCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/BhattaraiS18,
  author       = {Anshu Bhattarai and
                  Ambareen Siraj},
  editor       = {Satyajit Chakrabarti and
                  Himadri Nath Saha},
  title        = {Increasing Accuracy of Hand-Motion Based Continuous Authentication
                  Systems},
  booktitle    = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2018, New York City, NY, USA, November
                  8-10, 2018},
  pages        = {70--76},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/UEMCON.2018.8796725},
  doi          = {10.1109/UEMCON.2018.8796725},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/uemcom/BhattaraiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FordTS18,
  author       = {Vitaly Ford and
                  Daniel Tyler and
                  Ambareen Siraj},
  editor       = {Christian S. Collberg and
                  Peter A. H. Peterson},
  title        = {AMIsim: Application-layer Advanced Metering Infrastructure Simulation
                  Framework for Secure Communication Protocol Performance Evaluation},
  booktitle    = {11th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2018, Baltimore, MD, USA, August 13, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/cset18/presentation/ford},
  timestamp    = {Mon, 01 Feb 2021 08:43:10 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FordTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FordSR17,
  author       = {Vitaly Ford and
                  Ambareen Siraj and
                  Mohammad Ashiqur Rahman},
  title        = {Secure and efficient protection of consumer privacy in Advanced Metering
                  Infrastructure supporting fine-grained data analysis},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {83},
  number       = {1},
  pages        = {84--100},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.06.005},
  doi          = {10.1016/J.JCSS.2016.06.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FordSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/FordSHB17,
  author       = {Vitaly Ford and
                  Ambareen Siraj and
                  Ada Haynes and
                  Eric L. Brown},
  editor       = {Michael E. Caspersen and
                  Stephen H. Edwards and
                  Tiffany Barnes and
                  Daniel D. Garcia},
  title        = {Capture the Flag Unplugged: an Offline Cyber Competition},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer
                  Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017},
  pages        = {225--230},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3017680.3017783},
  doi          = {10.1145/3017680.3017783},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/FordSHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WeissSMHTKL17,
  author       = {Richard S. Weiss and
                  Ambareen Siraj and
                  Jens Mache and
                  Elizabeth K. Hawthorne and
                  Blair Taylor and
                  Siddharth Kaza and
                  Michael E. Locasto},
  editor       = {Michael E. Caspersen and
                  Stephen H. Edwards and
                  Tiffany Barnes and
                  Daniel D. Garcia},
  title        = {Building and Supporting a Community of {CS} Educators Teaching Cybersecurity
                  in 2017 (Abstract Only)},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer
                  Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017},
  pages        = {732},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3017680.3022370},
  doi          = {10.1145/3017680.3022370},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/WeissSMHTKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LedbetterWHSB16,
  author       = {Brian Ledbetter and
                  Zach Wallace and
                  Adam Harms and
                  Ambareen Siraj and
                  Laurin Buchanan},
  title        = {CySCom: Cybersecurity COMics},
  booktitle    = {{IEEE} Conference on Intelligence and Security Informatics, {ISI}
                  2016, Tucson, AZ, USA, September 28-30, 2016},
  pages        = {282--284},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISI.2016.7745490},
  doi          = {10.1109/ISI.2016.7745490},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LedbetterWHSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/0001LMTHKS16,
  author       = {Richard Weiss and
                  Michael E. Locasto and
                  Jens Mache and
                  Blair Taylor and
                  Elizabeth K. Hawthorne and
                  Siddharth Kaza and
                  Ambareen Siraj},
  editor       = {Carl Alphonce and
                  Jodi L. Tims and
                  Michael E. Caspersen and
                  Stephen H. Edwards},
  title        = {Assessment of Security Knowledge, Skills and Abilities using Hands-On
                  Exercises in 2016 (Abstract Only)},
  booktitle    = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
                  Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016},
  pages        = {709},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2839509.2850501},
  doi          = {10.1145/2839509.2850501},
  timestamp    = {Mon, 13 Dec 2021 09:32:31 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/0001LMTHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SirajG16,
  author       = {Ambareen Siraj and
                  Sheikh K. Ghafoor},
  editor       = {Carl Alphonce and
                  Jodi L. Tims and
                  Michael E. Caspersen and
                  Stephen H. Edwards},
  title        = {CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed
                  Security Topics into Upper Division {CS} Courses (Abstract Only)},
  booktitle    = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
                  Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016},
  pages        = {711},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2839509.2844702},
  doi          = {10.1145/2839509.2844702},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/SirajG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/SirajTKG15,
  author       = {Ambareen Siraj and
                  Blair Taylor and
                  Siddharth Kaza and
                  Sheikh K. Ghafoor},
  title        = {Integrating security in the computer science curriculum},
  journal      = {Inroads},
  volume       = {6},
  number       = {2},
  pages        = {77--81},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766457},
  doi          = {10.1145/2766457},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inroads/SirajTKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/MookiahES15,
  author       = {Lenin Mookiah and
                  William Eberle and
                  Ambareen Siraj},
  editor       = {Ingrid Russell and
                  William Eberle},
  title        = {Survey of Crime Analysis and Prediction},
  booktitle    = {Proceedings of the Twenty-Eighth International Florida Artificial
                  Intelligence Research Society Conference, {FLAIRS} 2015, Hollywood,
                  Florida, USA, May 18-20, 2015},
  pages        = {440--443},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/paper/view/10379},
  timestamp    = {Wed, 26 Oct 2022 08:35:13 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/MookiahES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RabiehMSM15,
  author       = {Khaled Rabieh and
                  Mohamed Mahmoud and
                  Ambareen Siraj and
                  Jelena V. Misic},
  title        = {Efficient Privacy-Preserving Chatting Scheme with Degree of Interest
                  Verification for Vehicular Social Networks},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417514},
  doi          = {10.1109/GLOCOM.2014.7417514},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/RabiehMSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/CodyFS15,
  author       = {Christa Cody and
                  Vitaly Ford and
                  Ambareen Siraj},
  editor       = {Tao Li and
                  Lukasz A. Kurgan and
                  Vasile Palade and
                  Randy Goebel and
                  Andreas Holzinger and
                  Karin Verspoor and
                  M. Arif Wani},
  title        = {Decision Tree Learning for Fraud Detection in Consumer Energy Consumption},
  booktitle    = {14th {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2015, Miami, FL, USA, December 9-11, 2015},
  pages        = {1175--1179},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICMLA.2015.80},
  doi          = {10.1109/ICMLA.2015.80},
  timestamp    = {Thu, 23 Feb 2023 11:36:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icmla/CodyFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FordS15,
  author       = {Vitaly Ford and
                  Ambareen Siraj},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Reliable and Efficient Protection of Consumer Privacy in
                  Advanced Metering Infrastructure},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {563--566},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_31},
  doi          = {10.1007/978-3-319-28865-9\_31},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FordS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WeissLMTHCS15,
  author       = {Richard S. Weiss and
                  Michael E. Locasto and
                  Jens Mache and
                  Blair Taylor and
                  Elizabeth K. Hawthorne and
                  Justin Cappos and
                  Ambareen Siraj},
  editor       = {Adrienne Decker and
                  Kurt Eiselt and
                  Carl Alphonce and
                  Jodi L. Tims},
  title        = {Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)},
  booktitle    = {Proceedings of the 46th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2015, Kansas City, MO, USA, March 4-7, 2015},
  pages        = {695},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2676723.2691862},
  doi          = {10.1145/2676723.2691862},
  timestamp    = {Mon, 13 Dec 2021 09:32:31 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/WeissLMTHCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciasg/FordSE14,
  author       = {Vitaly Ford and
                  Ambareen Siraj and
                  William Eberle},
  title        = {Smart grid energy fraud detection using artificial neural networks},
  booktitle    = {2014 {IEEE} Symposium on Computational Intelligence Applications in
                  Smart Grid, {CIASG} 2014, Orlando, FL, USA, December 9-12, 2014},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIASG.2014.7011557},
  doi          = {10.1109/CIASG.2014.7011557},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ciasg/FordSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/SirajGTH14,
  author       = {Ambareen Siraj and
                  Sheikh K. Ghafoor and
                  Joshua Tower and
                  Ada Haynes},
  editor       = {{\AA}sa Cajander and
                  Mats Daniels and
                  Tony Clear and
                  Arnold Pears},
  title        = {Empowering faculty to embed security topics into computer science
                  courses},
  booktitle    = {Innovation and Technology in Computer Science Education Conference
                  2014, ITiCSE '14, Uppsala, Sweden, June 23-25, 2014},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591708.2591741},
  doi          = {10.1145/2591708.2591741},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iticse/SirajGTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/KosaS14,
  author       = {Martha J. Kosa and
                  Ambareen Siraj},
  editor       = {J. D. Dougherty and
                  Kris Nagel and
                  Adrienne Decker and
                  Kurt Eiselt},
  title        = {The rising renaissance engineer spectrum awards (abstract only)},
  booktitle    = {The 45th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014},
  pages        = {717--718},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2538862.2544276},
  doi          = {10.1145/2538862.2544276},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/KosaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/FordS13,
  author       = {Vitaly Ford and
                  Ambareen Siraj},
  title        = {Clustering of smart meter data for disaggregation},
  booktitle    = {{IEEE} Global Conference on Signal and Information Processing, GlobalSIP
                  2013, Austin, TX, USA, December 3-5, 2013},
  pages        = {507--510},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GlobalSIP.2013.6736926},
  doi          = {10.1109/GLOBALSIP.2013.6736926},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/FordS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/StitesSB13,
  author       = {Joseph Stites and
                  Ambareen Siraj and
                  Eric L. Brown},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Smart Grid Security Educational Training with ThunderCloud: {A} Virtual
                  Security Test Bed},
  booktitle    = {Proceedings of the 2013 Information Security Curriculum Development
                  Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2528908.2528927},
  doi          = {10.1145/2528908.2528927},
  timestamp    = {Tue, 06 Nov 2018 16:59:39 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/StitesSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SirajTC13,
  author       = {Ambareen Siraj and
                  Blair Taylor and
                  Stephen Cooper},
  editor       = {Tracy Camp and
                  Paul T. Tymann and
                  J. D. Dougherty and
                  Kris Nagel},
  title        = {Bringing security into traditional computer science courses: challenges
                  and support (abstract only)},
  booktitle    = {The 44th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2013, Denver, CO, USA, March 6-9, 2013},
  pages        = {747},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445196.2445469},
  doi          = {10.1145/2445196.2445469},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/SirajTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SirajKO12,
  author       = {Ambareen Siraj and
                  Martha J. Kosa and
                  Summer{-}Mistine Olmstead},
  editor       = {Laurie A. Smith King and
                  David R. Musicant and
                  Tracy Camp and
                  Paul T. Tymann},
  title        = {Weaving a tapestry: creating a satellite workshop to support {HS}
                  {CS} teachers in attracting and engaging students},
  booktitle    = {Proceedings of the 43rd {ACM} technical symposium on Computer science
                  education, {SIGCSE} 2012, Raleigh, NC, USA, February 29 - March 3,
                  2012},
  pages        = {493--498},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2157136.2157282},
  doi          = {10.1145/2157136.2157282},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/SirajKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/Pazos-RevillaS11,
  author       = {Marbin Pazos{-}Revilla and
                  Ambareen Siraj},
  editor       = {Wei Li},
  title        = {An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System},
  booktitle    = {Proceedings of the {ISCA} 26th International Conference on Computers
                  and Their Applications, {CATA} 2011, March 23-15, 2011, Holiday Inn
                  Downtown-Superdome, New Orleans, Louisiana, {USA}},
  pages        = {39--45},
  publisher    = {{ISCA}},
  year         = {2011},
  timestamp    = {Mon, 14 Nov 2011 12:39:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cata/Pazos-RevillaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDanielS10,
  author       = {Joseph L. McDaniel and
                  Ambareen Siraj},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards a secure Frequency Monitoring NETwork {(FNET)} system},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852713},
  doi          = {10.1145/1852666.1852713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDanielS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Siraj09,
  author       = {Ambareen Siraj},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Data fusion for improved situational understanding},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558649},
  doi          = {10.1145/1558607.1558649},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Siraj09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/MaloneS08,
  author       = {Brandon M. Malone and
                  Ambareen Siraj},
  title        = {Tracking requirements and threats for secure software development},
  booktitle    = {Proceedings of the 46th Annual Southeast Regional Conference, 2008,
                  Auburn, Alabama, USA, March 28-29, 2008},
  pages        = {278--281},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1593105.1593179},
  doi          = {10.1145/1593105.1593179},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/MaloneS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/SirajV07,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn},
  editor       = {Gongzhu Hu},
  title        = {Sensor Corroboration for Anomaly Sensors in an Intrusion Detection
                  Environment},
  booktitle    = {Proceedings of the {ISCA} 20th International Conference on Computer
                  Applications in Industry and Engineering, {CAINE} 2007, November 7-9,
                  2007, San Francisco, California, {USA}},
  pages        = {278--283},
  publisher    = {{ISCA}},
  year         = {2007},
  timestamp    = {Tue, 29 Jan 2008 07:45:48 +0100},
  biburl       = {https://dblp.org/rec/conf/caine/SirajV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SirajV05,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {A Cognitive Model for Alert Correlation in a Distributed Environment},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_18},
  doi          = {10.1007/11427995\_18},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SirajV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/SirajVB04,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn and
                  Susan M. Bridges},
  title        = {Decision Making For Network Health Assessment In An Intelligent Intrusion
                  Detection System Architecture},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {3},
  number       = {2},
  pages        = {281--306},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0219622004001057},
  doi          = {10.1142/S0219622004001057},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijitdm/SirajVB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SirajVB04,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn and
                  Susan Bridges},
  title        = {Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection
                  System Architecture},
  booktitle    = {37th Hawaii International Conference on System Sciences {(HICSS-37}
                  2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HICSS.2004.1265658},
  doi          = {10.1109/HICSS.2004.1265658},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SirajVB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnHS03,
  author       = {Rayford B. Vaughn and
                  Ronda R. Henning and
                  Ambareen Siraj},
  title        = {Information Assurance Measures and Metrics - State of Practice and
                  Proposed Taxonomy},
  booktitle    = {36th Hawaii International Conference on System Sciences {(HICSS-36}
                  2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island,
                  HI, {USA}},
  pages        = {331},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HICSS.2003.1174904},
  doi          = {10.1109/HICSS.2003.1174904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics