Cyber ranges and security testbeds: Scenarios, functions, tools and architecture MM Yamin, B Katt, V Gkioulos Computers & Security 88, 101636, 2020 | 259 | 2020 |
Weaponized AI for cyber attacks MM Yamin, M Ullah, H Ullah, B Katt Journal of Information Security and Applications 57, 102722, 2021 | 99 | 2021 |
Serious games in science education: a systematic literature M Ullah, SU Amin, M Munsif, MM Yamin, U Safaev, H Khan, S Khan, ... Virtual Reality & Intelligent Hardware 4 (3), 189-209, 2022 | 80 | 2022 |
Serious games as a tool to model attack and defense scenarios for cyber-security exercises MM Yamin, B Katt, M Nowostawski Computers & Security 110, 102450, 2021 | 49 | 2021 |
Attention-based LSTM network for action recognition in sports M Ullah, MM Yamin, A Mohammed, SD Khan, H Ullah, FA Cheikh Society for Imaging Science and Technology, 2021 | 40 | 2021 |
Modeling and executing cyber security exercise scenarios in cyber ranges MM Yamin, B Katt Computers & Security 116, 102635, 2022 | 37 | 2022 |
Cyber Security Skill Set Analysis for Common Curricula Development MM Yamin, B Katt International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019 | 24 | 2019 |
Implementation of insider threat detection system using honeypot based sensors and threat analytics MM Yamin, B Katt, K Sattar, MB Ahmad Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020 | 22 | 2020 |
Make it and break it: An iot smart home testbed case study MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski Proceedings of the 2nd International Symposium on Computer Science and …, 2018 | 21 | 2018 |
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper MM Yamin, B Katt Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018 | 17 | 2018 |
Modeling attack and defense scenarios for cyber security exercises MM Yamin, B Katt 5th interdisciPlinary cyber research conference 2019, 7, 2019 | 14 | 2019 |
Mobile device management (MDM) technologies, issues and challenges MM Yamin, B Katt Proceedings of the 3rd International Conference on Cryptography, Security …, 2019 | 14 | 2019 |
Detecting malicious windows commands using natural language processing techniques MM Yamin, B Katt Innovative Security Solutions for Information Technology and Communications …, 2019 | 12 | 2019 |
Automatic verification and execution of cyber attack on iot devices FL Færøy, MM Yamin, A Shukla, B Katt Sensors 23 (2), 733, 2023 | 11 | 2023 |
Use of cyber attack and defense agents in cyber ranges: A case study MM Yamin, B Katt Computers & Security 122, 102892, 2022 | 11 | 2022 |
Smart policing for a smart world opportunities, challenges and way forward MM Yamin, A Shalaginov, B Katt Advances in Information and Communication: Proceedings of the 2020 Future of …, 2020 | 11 | 2020 |
Mapping tools for open source intelligence with cyber kill chain for adversarial aware security MM Yamin, M Ullah, H Ullah, B Katt, M Hijji, K Muhammad Mathematics 10 (12), 2054, 2022 | 8 | 2022 |
Advancing fake news detection: hybrid deep learning with fasttext and explainable AI E Hashmi, SY Yayilgan, MM Yamin, S Ali, M Abomhara IEEE Access, 2024 | 6 | 2024 |
Detecting windows based exploit chains by means of event correlation and process monitoring MM Yamiun, B Katt, V Gkioulos Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020 | 6 | 2020 |
Hybrid IoT cyber range KE Balto, MM Yamin, A Shalaginov, B Katt Sensors 23 (6), 3071, 2023 | 5 | 2023 |