关注
Junaid Haseeb
Junaid Haseeb
在 waikato.ac.nz 的电子邮件经过验证
标题
引用次数
引用次数
年份
A measurement study of iot-based attacks using iot kill chain
J Haseeb, M Mansoori, I Welch
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
262020
Autoencoder-based feature construction for IoT attacks clustering
J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch
Future Generation Computer Systems 127, 487-502, 2022
212022
Application of formal methods to modelling and analysis aspects of business process reengineering
J Haseeb, N Ahmad, SUR Malik, A Anjum
Business Process Management Journal 26 (2), 548-569, 2020
172020
Secure provenance in wireless sensor networks-a survey of provenance schemes
K Hameed, J Haseeb, M Tayyab, M Junaid, TB Maqsood, MH Naqvi
2017 International Conference on Communication, Computing and Digital …, 2017
112017
Iot attacks: Features identification and clustering
J Haseeb, M Mansoori, H Al-Sahaf, I Welch
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
102020
Identifying deviations in software processes
B Zuhaira, N Ahmad, T Saba, J Haseeb, SUR Malik, U Manzoor, ...
IEEE Access 5, 20319-20332, 2017
92017
Probabilistic modelling of deception-based security framework using markov decision process
J Haseeb, SUR Malik, M Mansoori, I Welch
Computers & Security 115, 102599, 2022
62022
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT
J Haseeb, M Mansoori, I Welch
2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021
62021
Deception-based security framework for iot: An empirical study
J Haseeb
Open Access Te Herenga Waka-Victoria University of Wellington, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–9