Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ambareen Siraj
@article{DBLP:journals/ijisec/AyubSFG24, author = {Md. Ahsan Ayub and Ambareen Siraj and Bobby Filar and Maanak Gupta}, title = {RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {533--556}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00758-z}, doi = {10.1007/S10207-023-00758-Z}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AyubSFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AyubS23, author = {Md. Ahsan Ayub and Ambareen Siraj}, title = {Understanding the Behavior of Ransomware: An {I/O} Request Packet {(IRP)} Driven Study on Ransomware Detection against Execution Time}, booktitle = {9th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CIC58953.2023.00018}, doi = {10.1109/CIC58953.2023.00018}, timestamp = {Thu, 07 Mar 2024 22:43:57 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AyubS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YilmazS21, author = {Ibrahim Yilmaz and Ambareen Siraj}, title = {Avoiding Occupancy Detection From Smart Meter Using Adversarial Machine Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {35411--35430}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3057525}, doi = {10.1109/ACCESS.2021.3057525}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YilmazS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LandS21, author = {Kendall Land and Ambareen Siraj}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Blockchain Based Farm-to-Fork Supply Chain Tracking}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {3416--3425}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671969}, doi = {10.1109/BIGDATA52589.2021.9671969}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/LandS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/YilmazKSA21, author = {Ibrahim Yilmaz and Kavish Kapoor and Ambareen Siraj and Mahmoud Abouyoussef}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning}, booktitle = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021}, pages = {33--38}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445969.3450431}, doi = {10.1145/3445969.3450431}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/YilmazKSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SirajSHKKGM21, author = {Ambareen Siraj and Nigamanth Sridhar and John A. Drew Hamilton and Latifur Khan and Siddharth Kaza and Maanak Gupta and Sudip Mittal}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Is there a Security Mindset and Can it be Taught?}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {335--336}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450358}, doi = {10.1145/3422337.3450358}, timestamp = {Wed, 21 Apr 2021 10:54:09 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SirajSHKKGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/AyubSST21, author = {Md. Ahsan Ayub and Steven Smith and Ambareen Siraj and Paul Tinker}, title = {Domain Generating Algorithm based Malicious Domains Detection}, booktitle = {8th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2021/7th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28, 2021}, pages = {77--82}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00024}, doi = {10.1109/CSCLOUD-EDGECOM52276.2021.00024}, timestamp = {Thu, 05 Aug 2021 09:37:29 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/AyubSST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WeissMHSTKC21, author = {Richard Weiss and Jens Mache and Elizabeth K. Hawthorne and Ambareen Siraj and Blair Taylor and Siddharth Kaza and Ankur Chattopadhyay}, editor = {Mark Sherriff and Laurence D. Merkle and Pamela A. Cutter and Alvaro E. Monge and Judithe Sheard}, title = {Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021}, booktitle = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021}, pages = {1358}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3408877.3439530}, doi = {10.1145/3408877.3439530}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/WeissMHSTKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/AyubS21, author = {Md. Ahsan Ayub and Ambareen Siraj}, title = {Similarity Analysis of Ransomware based on Portable Executable {(PE)} File Metadata}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021, Orlando, FL, USA, December 5-7, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SSCI50451.2021.9660019}, doi = {10.1109/SSCI50451.2021.9660019}, timestamp = {Thu, 03 Feb 2022 09:28:31 +0100}, biburl = {https://dblp.org/rec/conf/ssci/AyubS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-00521, author = {Ibrahim Yilmaz and Ambareen Siraj and Denis A. Ulybyshev}, title = {Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2101.00521}, year = {2021}, url = {https://arxiv.org/abs/2101.00521}, eprinttype = {arXiv}, eprint = {2101.00521}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-00521.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-06308, author = {Ibrahim Yilmaz and Kavish Kapoor and Ambareen Siraj and Mahmoud Abouyoussef}, title = {Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2101.06308}, year = {2021}, url = {https://arxiv.org/abs/2101.06308}, eprinttype = {arXiv}, eprint = {2101.06308}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-06308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/IslamEGSR20, author = {Sheikh Rabiul Islam and William Eberle and Sheikh K. Ghafoor and Ambareen Siraj and Mike Rogers}, editor = {Andreas Martin and Knut Hinkelmann and Hans{-}Georg Fill and Aurona Gerber and Doug Lenat and Reinhard Stolle and Frank van Harmelen}, title = {Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response}, booktitle = {Proceedings of the {AAAI} 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, {AAAI-MAKE} 2020, Palo Alto, CA, USA, March 23-25, 2020, Volume {I}}, series = {{CEUR} Workshop Proceedings}, volume = {2600}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2600/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:39 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/IslamEGSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/AyubJTS20, author = {Md. Ahsan Ayub and William A. Johnson and Douglas A. Talbert and Ambareen Siraj}, title = {Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning}, booktitle = {54th Annual Conference on Information Sciences and Systems, {CISS} 2020, Princeton, NJ, USA, March 18-20, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CISS48834.2020.1570617116}, doi = {10.1109/CISS48834.2020.1570617116}, timestamp = {Wed, 20 May 2020 12:05:09 +0200}, biburl = {https://dblp.org/rec/conf/ciss/AyubJTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JeziorowskiIS20, author = {Susan Jeziorowski and Muhammad Ismail and Ambareen Siraj}, editor = {Rakesh M. Verma and Latifur Khan and Chilukuri K. Mohan}, title = {Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces}, booktitle = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020}, pages = {15--22}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375708.3380311}, doi = {10.1145/3375708.3380311}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JeziorowskiIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/YilmazMS20, author = {Ibrahim Yilmaz and Rahat Masum and Ambareen Siraj}, title = {Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection}, booktitle = {21st International Conference on Information Reuse and Integration for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020}, pages = {25--30}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IRI49571.2020.00012}, doi = {10.1109/IRI49571.2020.00012}, timestamp = {Mon, 21 Sep 2020 16:27:44 +0200}, biburl = {https://dblp.org/rec/conf/iri/YilmazMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AyubCS20, author = {Md. Ahsan Ayub and Andrea Continella and Ambareen Siraj}, title = {An {I/O} Request Packet {(IRP)} Driven Effective Ransomware Detection Scheme using Artificial Neural Network}, booktitle = {21st International Conference on Information Reuse and Integration for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020}, pages = {319--324}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IRI49571.2020.00053}, doi = {10.1109/IRI49571.2020.00053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/AyubCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12640, author = {Ibrahim Yilmaz and Ambareen Siraj}, title = {Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2010.12640}, year = {2020}, url = {https://arxiv.org/abs/2010.12640}, eprinttype = {arXiv}, eprint = {2010.12640}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/AyubSS19, author = {Md. Ahsan Ayub and Steven Smith and Ambareen Siraj}, editor = {Meikang Qiu}, title = {A Protocol Independent Approach in Network Covert Channel Detection}, booktitle = {2019 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3, 2019}, pages = {165--170}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSE/EUC.2019.00040}, doi = {10.1109/CSE/EUC.2019.00040}, timestamp = {Tue, 28 Jan 2020 15:18:52 +0100}, biburl = {https://dblp.org/rec/conf/cse/AyubSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mldm/GuoDS19, author = {Terry N. Guo and Animesh Dahal and Ambareen Siraj}, editor = {Petra Perner}, title = {Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System {(ICS)} Environment?}, booktitle = {Machine Learning and Data Mining in Pattern Recognition, 15th International Conference on Machine Learning and Data Mining, {MLDM} 2019, New York, NY, USA, July 20-25, 2019, Proceedings, Volume {I}}, pages = {319--332}, publisher = {ibai Publishing}, year = {2019}, timestamp = {Sat, 21 Aug 2021 13:54:13 +0200}, biburl = {https://dblp.org/rec/conf/mldm/GuoDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09853, author = {Sheikh Rabiul Islam and William Eberle and Sheikh K. Ghafoor and Ambareen Siraj and Mike Rogers}, title = {Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response}, journal = {CoRR}, volume = {abs/1911.09853}, year = {2019}, url = {http://arxiv.org/abs/1911.09853}, eprinttype = {arXiv}, eprint = {1911.09853}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09853.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09858, author = {Sheikh Rabiul Islam and William Eberle and Sheikh K. Ghafoor and Sid C. Bundy and Douglas A. Talbert and Ambareen Siraj}, title = {Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy}, journal = {CoRR}, volume = {abs/1911.09858}, year = {2019}, url = {http://arxiv.org/abs/1911.09858}, eprinttype = {arXiv}, eprint = {1911.09858}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/GuoKCPS18, author = {Terry N. Guo and Damon Khoo and Michael Coultis and Marbin Pazos{-}Revilla and Ambareen Siraj}, title = {Poster Abstract: IoT Platform for Engineering Education and Research (IoT PEER)-Applications in Secure and Smart Manufacturing}, booktitle = {2018 {IEEE/ACM} Third International Conference on Internet-of-Things Design and Implementation, IoTDI 2018, Orlando, FL, USA, April 17-20, 2018}, pages = {277--278}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IoTDI.2018.00038}, doi = {10.1109/IOTDI.2018.00038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotdi/GuoKCPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SirajG17, author = {Ambareen Siraj and Sheikh K. Ghafoor}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {CReST-Security Knitting Kit: Readily Available Teaching Resources to Integrate Security Topics into Traditional {CS} Courses (Abstract Only)}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {1058}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3162355}, doi = {10.1145/3159450.3162355}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/SirajG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WeissSMTKCL17, author = {Richard Weiss and Ambareen Siraj and Jens Mache and Blair Taylor and Siddharth Kaza and Ankur Chattopadhyay and Michael E. Locasto}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only)}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {1070}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3162195}, doi = {10.1145/3159450.3162195}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/WeissSMTKCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/BhattaraiS18, author = {Anshu Bhattarai and Ambareen Siraj}, editor = {Satyajit Chakrabarti and Himadri Nath Saha}, title = {Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems}, booktitle = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2018, New York City, NY, USA, November 8-10, 2018}, pages = {70--76}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/UEMCON.2018.8796725}, doi = {10.1109/UEMCON.2018.8796725}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/BhattaraiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FordTS18, author = {Vitaly Ford and Daniel Tyler and Ambareen Siraj}, editor = {Christian S. Collberg and Peter A. H. Peterson}, title = {AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation}, booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2018, Baltimore, MD, USA, August 13, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/cset18/presentation/ford}, timestamp = {Mon, 01 Feb 2021 08:43:10 +0100}, biburl = {https://dblp.org/rec/conf/uss/FordTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FordSR17, author = {Vitaly Ford and Ambareen Siraj and Mohammad Ashiqur Rahman}, title = {Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {84--100}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.06.005}, doi = {10.1016/J.JCSS.2016.06.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/FordSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/FordSHB17, author = {Vitaly Ford and Ambareen Siraj and Ada Haynes and Eric L. Brown}, editor = {Michael E. Caspersen and Stephen H. Edwards and Tiffany Barnes and Daniel D. Garcia}, title = {Capture the Flag Unplugged: an Offline Cyber Competition}, booktitle = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017}, pages = {225--230}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3017680.3017783}, doi = {10.1145/3017680.3017783}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/FordSHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WeissSMHTKL17, author = {Richard S. Weiss and Ambareen Siraj and Jens Mache and Elizabeth K. Hawthorne and Blair Taylor and Siddharth Kaza and Michael E. Locasto}, editor = {Michael E. Caspersen and Stephen H. Edwards and Tiffany Barnes and Daniel D. Garcia}, title = {Building and Supporting a Community of {CS} Educators Teaching Cybersecurity in 2017 (Abstract Only)}, booktitle = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017}, pages = {732}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3017680.3022370}, doi = {10.1145/3017680.3022370}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/WeissSMHTKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LedbetterWHSB16, author = {Brian Ledbetter and Zach Wallace and Adam Harms and Ambareen Siraj and Laurin Buchanan}, title = {CySCom: Cybersecurity COMics}, booktitle = {{IEEE} Conference on Intelligence and Security Informatics, {ISI} 2016, Tucson, AZ, USA, September 28-30, 2016}, pages = {282--284}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISI.2016.7745490}, doi = {10.1109/ISI.2016.7745490}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/LedbetterWHSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/0001LMTHKS16, author = {Richard Weiss and Michael E. Locasto and Jens Mache and Blair Taylor and Elizabeth K. Hawthorne and Siddharth Kaza and Ambareen Siraj}, editor = {Carl Alphonce and Jodi L. Tims and Michael E. Caspersen and Stephen H. Edwards}, title = {Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only)}, booktitle = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016}, pages = {709}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2839509.2850501}, doi = {10.1145/2839509.2850501}, timestamp = {Mon, 13 Dec 2021 09:32:31 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/0001LMTHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SirajG16, author = {Ambareen Siraj and Sheikh K. Ghafoor}, editor = {Carl Alphonce and Jodi L. Tims and Michael E. Caspersen and Stephen H. Edwards}, title = {CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into Upper Division {CS} Courses (Abstract Only)}, booktitle = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016}, pages = {711}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2839509.2844702}, doi = {10.1145/2839509.2844702}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/SirajG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inroads/SirajTKG15, author = {Ambareen Siraj and Blair Taylor and Siddharth Kaza and Sheikh K. Ghafoor}, title = {Integrating security in the computer science curriculum}, journal = {Inroads}, volume = {6}, number = {2}, pages = {77--81}, year = {2015}, url = {https://doi.org/10.1145/2766457}, doi = {10.1145/2766457}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inroads/SirajTKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/MookiahES15, author = {Lenin Mookiah and William Eberle and Ambareen Siraj}, editor = {Ingrid Russell and William Eberle}, title = {Survey of Crime Analysis and Prediction}, booktitle = {Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, {FLAIRS} 2015, Hollywood, Florida, USA, May 18-20, 2015}, pages = {440--443}, publisher = {{AAAI} Press}, year = {2015}, url = {http://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/paper/view/10379}, timestamp = {Wed, 26 Oct 2022 08:35:13 +0200}, biburl = {https://dblp.org/rec/conf/flairs/MookiahES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RabiehMSM15, author = {Khaled Rabieh and Mohamed Mahmoud and Ambareen Siraj and Jelena V. Misic}, title = {Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417514}, doi = {10.1109/GLOCOM.2014.7417514}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/RabiehMSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/CodyFS15, author = {Christa Cody and Vitaly Ford and Ambareen Siraj}, editor = {Tao Li and Lukasz A. Kurgan and Vasile Palade and Randy Goebel and Andreas Holzinger and Karin Verspoor and M. Arif Wani}, title = {Decision Tree Learning for Fraud Detection in Consumer Energy Consumption}, booktitle = {14th {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2015, Miami, FL, USA, December 9-11, 2015}, pages = {1175--1179}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICMLA.2015.80}, doi = {10.1109/ICMLA.2015.80}, timestamp = {Thu, 23 Feb 2023 11:36:05 +0100}, biburl = {https://dblp.org/rec/conf/icmla/CodyFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FordS15, author = {Vitaly Ford and Ambareen Siraj}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {{POSTER:} Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {563--566}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_31}, doi = {10.1007/978-3-319-28865-9\_31}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/FordS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WeissLMTHCS15, author = {Richard S. Weiss and Michael E. Locasto and Jens Mache and Blair Taylor and Elizabeth K. Hawthorne and Justin Cappos and Ambareen Siraj}, editor = {Adrienne Decker and Kurt Eiselt and Carl Alphonce and Jodi L. Tims}, title = {Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)}, booktitle = {Proceedings of the 46th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2015, Kansas City, MO, USA, March 4-7, 2015}, pages = {695}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2676723.2691862}, doi = {10.1145/2676723.2691862}, timestamp = {Mon, 13 Dec 2021 09:32:31 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/WeissLMTHCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciasg/FordSE14, author = {Vitaly Ford and Ambareen Siraj and William Eberle}, title = {Smart grid energy fraud detection using artificial neural networks}, booktitle = {2014 {IEEE} Symposium on Computational Intelligence Applications in Smart Grid, {CIASG} 2014, Orlando, FL, USA, December 9-12, 2014}, pages = {91--96}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CIASG.2014.7011557}, doi = {10.1109/CIASG.2014.7011557}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ciasg/FordSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/SirajGTH14, author = {Ambareen Siraj and Sheikh K. Ghafoor and Joshua Tower and Ada Haynes}, editor = {{\AA}sa Cajander and Mats Daniels and Tony Clear and Arnold Pears}, title = {Empowering faculty to embed security topics into computer science courses}, booktitle = {Innovation and Technology in Computer Science Education Conference 2014, ITiCSE '14, Uppsala, Sweden, June 23-25, 2014}, pages = {99--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591708.2591741}, doi = {10.1145/2591708.2591741}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iticse/SirajGTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/KosaS14, author = {Martha J. Kosa and Ambareen Siraj}, editor = {J. D. Dougherty and Kris Nagel and Adrienne Decker and Kurt Eiselt}, title = {The rising renaissance engineer spectrum awards (abstract only)}, booktitle = {The 45th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014}, pages = {717--718}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2538862.2544276}, doi = {10.1145/2538862.2544276}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/KosaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/FordS13, author = {Vitaly Ford and Ambareen Siraj}, title = {Clustering of smart meter data for disaggregation}, booktitle = {{IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013}, pages = {507--510}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GlobalSIP.2013.6736926}, doi = {10.1109/GLOBALSIP.2013.6736926}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globalsip/FordS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/StitesSB13, author = {Joseph Stites and Ambareen Siraj and Eric L. Brown}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Smart Grid Security Educational Training with ThunderCloud: {A} Virtual Security Test Bed}, booktitle = {Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013}, pages = {105--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2528908.2528927}, doi = {10.1145/2528908.2528927}, timestamp = {Tue, 06 Nov 2018 16:59:39 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/StitesSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SirajTC13, author = {Ambareen Siraj and Blair Taylor and Stephen Cooper}, editor = {Tracy Camp and Paul T. Tymann and J. D. Dougherty and Kris Nagel}, title = {Bringing security into traditional computer science courses: challenges and support (abstract only)}, booktitle = {The 44th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2013, Denver, CO, USA, March 6-9, 2013}, pages = {747}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2445196.2445469}, doi = {10.1145/2445196.2445469}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/SirajTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SirajKO12, author = {Ambareen Siraj and Martha J. Kosa and Summer{-}Mistine Olmstead}, editor = {Laurie A. Smith King and David R. Musicant and Tracy Camp and Paul T. Tymann}, title = {Weaving a tapestry: creating a satellite workshop to support {HS} {CS} teachers in attracting and engaging students}, booktitle = {Proceedings of the 43rd {ACM} technical symposium on Computer science education, {SIGCSE} 2012, Raleigh, NC, USA, February 29 - March 3, 2012}, pages = {493--498}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2157136.2157282}, doi = {10.1145/2157136.2157282}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/SirajKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/Pazos-RevillaS11, author = {Marbin Pazos{-}Revilla and Ambareen Siraj}, editor = {Wei Li}, title = {An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System}, booktitle = {Proceedings of the {ISCA} 26th International Conference on Computers and Their Applications, {CATA} 2011, March 23-15, 2011, Holiday Inn Downtown-Superdome, New Orleans, Louisiana, {USA}}, pages = {39--45}, publisher = {{ISCA}}, year = {2011}, timestamp = {Mon, 14 Nov 2011 12:39:54 +0100}, biburl = {https://dblp.org/rec/conf/cata/Pazos-RevillaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDanielS10, author = {Joseph L. McDaniel and Ambareen Siraj}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Towards a secure Frequency Monitoring NETwork {(FNET)} system}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852713}, doi = {10.1145/1852666.1852713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDanielS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Siraj09, author = {Ambareen Siraj}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Data fusion for improved situational understanding}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {37}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558649}, doi = {10.1145/1558607.1558649}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Siraj09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/MaloneS08, author = {Brandon M. Malone and Ambareen Siraj}, title = {Tracking requirements and threats for secure software development}, booktitle = {Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008}, pages = {278--281}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1593105.1593179}, doi = {10.1145/1593105.1593179}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/MaloneS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/SirajV07, author = {Ambareen Siraj and Rayford B. Vaughn}, editor = {Gongzhu Hu}, title = {Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment}, booktitle = {Proceedings of the {ISCA} 20th International Conference on Computer Applications in Industry and Engineering, {CAINE} 2007, November 7-9, 2007, San Francisco, California, {USA}}, pages = {278--283}, publisher = {{ISCA}}, year = {2007}, timestamp = {Tue, 29 Jan 2008 07:45:48 +0100}, biburl = {https://dblp.org/rec/conf/caine/SirajV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SirajV05, author = {Ambareen Siraj and Rayford B. Vaughn}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {A Cognitive Model for Alert Correlation in a Distributed Environment}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {218--230}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_18}, doi = {10.1007/11427995\_18}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/isi/SirajV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/SirajVB04, author = {Ambareen Siraj and Rayford B. Vaughn and Susan M. Bridges}, title = {Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {3}, number = {2}, pages = {281--306}, year = {2004}, url = {https://doi.org/10.1142/S0219622004001057}, doi = {10.1142/S0219622004001057}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitdm/SirajVB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SirajVB04, author = {Ambareen Siraj and Rayford B. Vaughn and Susan Bridges}, title = {Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture}, booktitle = {37th Hawaii International Conference on System Sciences {(HICSS-37} 2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HICSS.2004.1265658}, doi = {10.1109/HICSS.2004.1265658}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SirajVB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnHS03, author = {Rayford B. Vaughn and Ronda R. Henning and Ambareen Siraj}, title = {Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy}, booktitle = {36th Hawaii International Conference on System Sciences {(HICSS-36} 2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, {USA}}, pages = {331}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HICSS.2003.1174904}, doi = {10.1109/HICSS.2003.1174904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.