Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic MN Sakib, CT Huang 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 40 | 2016 |
Improving transmission efficiency of large sequence alignment/map (SAM) files MN Sakib, J Tang, WJ Zheng, CT Huang PloS one 6 (12), e28251, 2011 | 28 | 2011 |
Maximizing accuracy in multi-scanner malware detection systems MN Sakib, CT Huang, YD Lin Computer Networks 169, 107027, 2020 | 16 | 2020 |
A Bayesian Game Theoretic Approach for Inspecting Web-based Malvertising CT Huang, MN Sakib, C Kamhoua, KA Kwiat, L Njilla IEEE Transactions on Dependable and Secure Computing, 2018 | 14 | 2018 |
Determining location and movement pattern using anonymized wifi access point bssid MN Sakib, JB Halim, CT Huang 2014 7th International Conference on Security Technology, 11-14, 2014 | 13 | 2014 |
Privacy preserving proximity testing using elliptic curves MN Sakib, CT Huang 2016 26th International Telecommunication Networks and Applications …, 2017 | 12 | 2017 |
Automated collection and analysis of malware disseminated via online advertising MN Sakib, CT Huang 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1411-1416, 2015 | 12 | 2015 |
A game theoretic approach for inspecting web-based malvertising CT Huang, MN Sakib, C Kamhoua, K Kwiat, L Njilla 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 9 | 2017 |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak CT Huang, MN Sakib, L Njilla, C Kamhoua 2019 International Conference on Computing, Networking and Communications (ICNC), 2019 | 4 | 2019 |
Revealing malicious contents hidden in the Internet MN Sakib University of South Carolina, 2016 | | 2016 |
Textact: A text-action based web authentication scheme MN Sakib, CT Huang 2012 IEEE Global Communications Conference (GLOBECOM), 955-960, 2012 | | 2012 |