Follow
Masood Mansoori
Masood Mansoori
Victoria University of Wellington, University of New South Wales (UNSW) Canberra
Verified email at unsw.edu.au - Homepage
Title
Cited by
Cited by
Year
Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)
AH Lashkari, M Mansoori, A Seyed Danesh
2009 International Conference on Signal Processing Systems, 445-449, 2009
103*2009
A machine learning based web spam filtering approach
S Kumar, X Gao, I Welch, M Mansoori
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
692016
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
MS Abbasi, H Al-Sahaf, M Mansoori, I Welch
Applied Soft Computing 121, 108744, 2022
672022
YALIH, yet another low interaction honeyclient
M Mansoori, I Welch, Q Fu
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
292014
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
J Haseeb, M Mansoori, I Welch
Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020
282020
Improving exposure of intrusion deception system through implementation of hybrid honeypot
M Mansoori, O Zakaria, A Gani
The International Arab Journal of Information Technology 9 (5), 436-444, 2012
252012
A hybrid recognition and recall based approach in graphical passwords
T Zangooei, M Mansoori, I Welch
Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012
242012
Autoencoder-based feature construction for IoT attacks clustering
J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch
Future Generation Computer Systems 127, 487-502, 2022
232022
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot
H Mohammadzadeh, M Mansoori, I Welch
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
202013
How do they find us? A study of geolocation tracking techniques of malicious web sites
M Mansoori, I Welch
Computers & Security 97, 101948, 2020
122020
Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery
M Mansoori, Y Hirose, I Welch, KKR Choo
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
122016
IoT Attacks: Features Identification and Clustering
J Haseeb, M Mansoori, H Al-Sahaf, I Welch
Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020
102020
Application of hazop to the design of cyber security experiments
M Mansoori, I Welch, KKR Choo, RA Maxion
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
102016
Real-world IP and network tracking measurement study of malicious websites with HAZOP
M Mansoori, I Welch, KKR Choo, RA Maxion, SE Hashemi
International Journal of Computers and Applications 39 (2), 106-121, 2017
92017
Probabilistic modelling of deception-based security framework using markov decision process
J Haseeb, SUR Malik, M Mansoori, I Welch
Computers & Security 115, 102599, 2022
62022
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT
J Haseeb, M Mansoori, I Welch
2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021
62021
Geolocation tracking and cloaking of malicious web sites
M Mansoori, I Welch
2019 IEEE 44th Conference on Local Computer Networks (LCN), 274-281, 2019
32019
Measurement of IP and network tracking behaviour of malicious websites
M Mansoori, I Welch, SE Hashemi
Proceedings of the Australasian Computer Science Week Multiconference, 1-8, 2016
12016
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
M Mansoori, R Hunt
International Journal of Network Security & Its Applications 3 (5), 59, 2011
12011
Detection of Advanced Persistent Threat: A Genetic Programming approach
A Al Mamun, H Al-Sahaf, I Welch, M Mansoori, S Camtepe
Applied Soft Computing, 112447, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20