Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony
He, Zhengxian, Rajput, Mohit Narayan, Ahamad, Mustaque
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01.06.2021)
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01.06.2021)
Get full text
Conference Proceeding
Improving Authentication Performance of Distributed SIP Proxies
Dacosta, I., Balasubramaniyan, V., Ahamad, M., Traynor, P.
Published in IEEE transactions on parallel and distributed systems (01.11.2011)
Published in IEEE transactions on parallel and distributed systems (01.11.2011)
Get full text
Journal Article
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Micallef, Nicholas, He, Bing, Kumar, Srijan, Ahamad, Mustaque, Memon, Nasir
Published in 2020 IEEE International Conference on Big Data (Big Data) (10.12.2020)
Published in 2020 IEEE International Conference on Big Data (Big Data) (10.12.2020)
Get full text
Conference Proceeding
SoK: Fraud in Telephony Networks
Sahin, Merve, Francillon, Aurelien, Gupta, Payas, Ahamad, Mustaque
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01.04.2017)
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01.04.2017)
Get full text
Conference Proceeding
Applying Deep Learning to Combat Mass Robocalls
Pandit, Sharbani, Liu, Jienan, Perdisci, Roberto, Ahamad, Mustaque
Published in 2021 IEEE Security and Privacy Workshops (SPW) (01.05.2021)
Published in 2021 IEEE Security and Privacy Workshops (SPW) (01.05.2021)
Get full text
Conference Proceeding
Responsive security for stored data
Lakshmanan, S., Ahamad, M., Venkateswaran, H.
Published in IEEE transactions on parallel and distributed systems (01.09.2003)
Published in IEEE transactions on parallel and distributed systems (01.09.2003)
Get full text
Journal Article
A context-aware security architecture for emerging applications
Covington, M.J., Fogla, P., Zhiyuan Zhan, Ahamad, M.
Published in 18th Annual Computer Security Applications Conference, 2002. Proceedings (2002)
Published in 18th Annual Computer Security Applications Conference, 2002. Proceedings (2002)
Get full text
Conference Proceeding
Trade-offs between reliability and overheads in peer-to-peer reputation tracking
Gupta, Minaxi, Ammar, Mostafa H., Ahamad, Mustaque
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.03.2006)
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.03.2006)
Get full text
Journal Article
Program Co-chair's Message
Published in 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
(2006)
Get full text
Conference Proceeding
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Micallef, Nicholas, He, Bing, Kumar, Srijan, Ahamad, Mustaque, Memon, Nasir
Year of Publication 11.11.2020
Year of Publication 11.11.2020
Get full text
Journal Article
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned
Alrawi, Omar, Wong, Miuyin Yong, Avgetidis, Athanasios, Valakuzhy, Kevin, Adjibi, Boladji Vinny, Karakatsanis, Konstantinos, Ahamad, Mustaque, Blough, Doug, Monrose, Fabian, Antonakakis, Manos
Year of Publication 24.03.2024
Year of Publication 24.03.2024
Get full text
Journal Article