Follow
Masood Mansoori
Masood Mansoori
Wellington Institute of Technology, Victoria University of Wellington
Verified email at weltec.ac.nz
Title
Cited by
Cited by
Year
Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)
AH Lashkari, M Mansoori, A Seyed Danesh
2009 International Conference on Signal Processing Systems, 445-449, 2009
101*2009
A machine learning based web spam filtering approach
S Kumar, X Gao, I Welch, M Mansoori
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
702016
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
MS Abbasi, H Al-Sahaf, M Mansoori, I Welch
Applied Soft Computing 121, 108744, 2022
522022
YALIH, yet another low interaction honeyclient
M Mansoori, I Welch, Q Fu
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
292014
Improving exposure of intrusion deception system through implementation of hybrid honeypot
M Mansoori, O Zakaria, A Gani
The International Arab Journal of Information Technology 9 (5), 436-444, 2012
252012
A hybrid recognition and recall based approach in graphical passwords
T Zangooei, M Mansoori, I Welch
Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012
242012
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
J Haseeb, M Mansoori, I Welch
Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020
232020
Autoencoder-based feature construction for IoT attacks clustering
J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf, I Welch
Future Generation Computer Systems 127, 487-502, 2022
212022
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot
H Mohammadzadeh, M Mansoori, I Welch
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
192013
Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery
M Mansoori, Y Hirose, I Welch, KKR Choo
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
112016
How do they find us? A study of geolocation tracking techniques of malicious web sites
M Mansoori, I Welch
Computers & Security 97, 101948, 2020
102020
Real-world IP and network tracking measurement study of malicious websites with HAZOP
M Mansoori, I Welch, KKR Choo, RA Maxion, SE Hashemi
International Journal of Computers and Applications 39 (2), 106-121, 2017
92017
Application of hazop to the design of cyber security experiments
M Mansoori, I Welch, KKR Choo, RA Maxion
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
82016
IoT Attacks: Features Identification and Clustering
J Haseeb, M Mansoori, H Al-Sahaf, I Welch
Proceedings of the 19th IEEE International Conference on Trust, Security and …, 2020
72020
Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT
J Haseeb, M Mansoori, I Welch
2021 IEEE 46th Conference on Local Computer Networks (LCN), 645-648, 2021
62021
Probabilistic modelling of deception-based security framework using markov decision process
J Haseeb, SUR Malik, M Mansoori, I Welch
Computers & Security 115, 102599, 2022
52022
Geolocation tracking and cloaking of malicious web sites
M Mansoori, I Welch
2019 IEEE 44th Conference on Local Computer Networks (LCN), 274-281, 2019
32019
Measurement of IP and network tracking behaviour of malicious websites
M Mansoori, I Welch, SE Hashemi
Proceedings of the Australasian Computer Science Week Multiconference, 1-8, 2016
12016
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
M Mansoori, R Hunt
International Journal of Network Security & Its Applications 3 (5), 59, 2011
12011
Probabilistic modelling of deception-based security framework using markov decision process (vol 115, 102599, 2022)
J Haseeb, SUR Malik, M Mansoori, I Welch
COMPUTERS & SECURITY 117, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20