A measurement study of iot-based attacks using iot kill chain J Haseeb, M Mansoori, I Welch 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 26 | 2020 |
Autoencoder-based feature construction for IoT attacks clustering J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch Future Generation Computer Systems 127, 487-502, 2022 | 21 | 2022 |
Application of formal methods to modelling and analysis aspects of business process reengineering J Haseeb, N Ahmad, SUR Malik, A Anjum Business Process Management Journal 26 (2), 548-569, 2020 | 17 | 2020 |
Secure provenance in wireless sensor networks-a survey of provenance schemes K Hameed, J Haseeb, M Tayyab, M Junaid, TB Maqsood, MH Naqvi 2017 International Conference on Communication, Computing and Digital …, 2017 | 11 | 2017 |
Iot attacks: Features identification and clustering J Haseeb, M Mansoori, H Al-Sahaf, I Welch 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 10 | 2020 |
Identifying deviations in software processes B Zuhaira, N Ahmad, T Saba, J Haseeb, SUR Malik, U Manzoor, ... IEEE Access 5, 20319-20332, 2017 | 9 | 2017 |
Probabilistic modelling of deception-based security framework using markov decision process J Haseeb, SUR Malik, M Mansoori, I Welch Computers & Security 115, 102599, 2022 | 6 | 2022 |
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT J Haseeb, M Mansoori, I Welch 2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021 | 6 | 2021 |
Deception-based security framework for iot: An empirical study J Haseeb Open Access Te Herenga Waka-Victoria University of Wellington, 2023 | 2 | 2023 |