Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) AH Lashkari, M Mansoori, A Seyed Danesh 2009 International Conference on Signal Processing Systems, 445-449, 2009 | 103* | 2009 |
A machine learning based web spam filtering approach S Kumar, X Gao, I Welch, M Mansoori 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 69 | 2016 |
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection MS Abbasi, H Al-Sahaf, M Mansoori, I Welch Applied Soft Computing 121, 108744, 2022 | 67 | 2022 |
YALIH, yet another low interaction honeyclient M Mansoori, I Welch, Q Fu Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 29 | 2014 |
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain J Haseeb, M Mansoori, I Welch Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020 | 28 | 2020 |
Improving exposure of intrusion deception system through implementation of hybrid honeypot M Mansoori, O Zakaria, A Gani The International Arab Journal of Information Technology 9 (5), 436-444, 2012 | 25 | 2012 |
A hybrid recognition and recall based approach in graphical passwords T Zangooei, M Mansoori, I Welch Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012 | 24 | 2012 |
Autoencoder-based feature construction for IoT attacks clustering J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch Future Generation Computer Systems 127, 487-502, 2022 | 23 | 2022 |
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot H Mohammadzadeh, M Mansoori, I Welch Proceedings of the Eleventh Australasian Information Security Conference …, 2013 | 20 | 2013 |
How do they find us? A study of geolocation tracking techniques of malicious web sites M Mansoori, I Welch Computers & Security 97, 101948, 2020 | 12 | 2020 |
Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery M Mansoori, Y Hirose, I Welch, KKR Choo 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 12 | 2016 |
IoT Attacks: Features Identification and Clustering J Haseeb, M Mansoori, H Al-Sahaf, I Welch Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020 | 10 | 2020 |
Application of hazop to the design of cyber security experiments M Mansoori, I Welch, KKR Choo, RA Maxion 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 10 | 2016 |
Real-world IP and network tracking measurement study of malicious websites with HAZOP M Mansoori, I Welch, KKR Choo, RA Maxion, SE Hashemi International Journal of Computers and Applications 39 (2), 106-121, 2017 | 9 | 2017 |
Probabilistic modelling of deception-based security framework using markov decision process J Haseeb, SUR Malik, M Mansoori, I Welch Computers & Security 115, 102599, 2022 | 6 | 2022 |
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT J Haseeb, M Mansoori, I Welch 2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021 | 6 | 2021 |
Geolocation tracking and cloaking of malicious web sites M Mansoori, I Welch 2019 IEEE 44th Conference on Local Computer Networks (LCN), 274-281, 2019 | 3 | 2019 |
Measurement of IP and network tracking behaviour of malicious websites M Mansoori, I Welch, SE Hashemi Proceedings of the Australasian Computer Science Week Multiconference, 1-8, 2016 | 1 | 2016 |
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users M Mansoori, R Hunt International Journal of Network Security & Its Applications 3 (5), 59, 2011 | 1 | 2011 |
Detection of Advanced Persistent Threat: A Genetic Programming approach A Al Mamun, H Al-Sahaf, I Welch, M Mansoori, S Camtepe Applied Soft Computing, 112447, 2024 | | 2024 |