Behavioral fingerprinting of iot devices B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018 | 273 | 2018 |
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features HSBBI Ray SACMAT 2018, 2018 | 107* | 2018 |
Demonstrating Practical Denial-of-Service Attacks in Embedded Networks of Commercial Vehicles RG Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily ICISS 2016, 0 | 72* | |
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices K Haynes, H Shirazi, I Ray The 18th International Conference on Mobile Systems and Pervasive Computing …, 2021 | 43 | 2021 |
Adversarial sampling attacks against phishing detection H Shirazi, B Bezawada, I Ray, C Anderson Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019 | 38 | 2019 |
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites H Shirazi, K Haefner, I Ray IEEE International Conference on Information Reuse and Integration, 137-143, 2017 | 33 | 2017 |
Automatic Software Test Case Generation MR Keyvanpour, H Homayouni, H Shirazi Journal of Software Engineering 5 (3), 91-101, 2011 | 31 | 2011 |
Automatic Software Test Case Generation: An Analytical Classification Framework MR Keyvanpour, H Homayouni, H Shirazi International Journal of Software Engineering and Its Applications 6 (4), 2012 | 30 | 2012 |
Attribute based access control for healthcare resources S Mukherjee, I Ray, I Ray, H Shirazi, T Ong, MG Kahn Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 29-40, 2017 | 29 | 2017 |
Improved phishing detection algorithms using adversarial autoencoder synthesized data H Shirazi, SR Muramudalige, I Ray, AP Jayasumana 2020 ieee 45th conference on local computer networks (lcn), 24-32, 2020 | 28 | 2020 |
Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls J Daily, R Gamble, S Moffitt, C Raines, P Harris, J Miran, I Ray, ... SAE 2016 Commercial Vehicle Engineering Congress, 2016 | 19 | 2016 |
Using machine learning to detect anomalies in embedded networks in heavy vehicles H Shirazi, I Ray, C Anderson Foundations and Practice of Security: 12th International Symposium, FPS 2019 …, 2020 | 10 | 2020 |
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-based Phishing Detection Algorithms APJHW H. Shirazi, S. R. Muramudalige, I. Ray IEEE Transactions on Services Computing, 2023 | 9 | 2023 |
Directed adversarial sampling attacks on phishing detection H Shirazi, B Bezawada, I Ray, C Anderson Journal of Computer Security 29 (1), 1-23, 2021 | 7 | 2021 |
Improving auto-detection of phishing websites using fresh-phish framework H Shirazi, K Haefner, I Ray International Journal of Multimedia Data Engineering and Management (IJMDEM …, 2018 | 7 | 2018 |
A Machine-learning based Unbiased Phishing Detection Approach H Shirazi, L Zweigle, I Ray 17th International Joint Conference on e-Business and Telecommunications …, 2020 | 6 | 2020 |
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter C Zuo, R Banerjee, F Hashemi Chaleshtori, H Shirazi, I Ray Journal of Data and Information Quality 15 (1), 1-26, 2022 | 5 | 2022 |
WiP: The Intrinsic Dimensionality of IoT Networks M Gorbett, H Shirazi, I Ray 27th ACM on Symposium on Access Control Models and Technologies (SACMAT '22), 2022 | 5 | 2022 |
A Classification Framework for Automatic Test Case Generation Techniques for web applications HS Mohammad Reza Keyvanpour, Hajar Homayouni International Journal of Information Processing and Management (IJIPM) 4 (3.3), 2013 | 4* | 2013 |
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection M Gorbett, H Shirazi, I Ray IFIP Annual Conference on Data and Applications Security and Privacy (DBSec …, 2022 | 3 | 2022 |