Follow
Muhammad Mudassar Yamin
Title
Cited by
Cited by
Year
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos
Computers & Security 88, 101636, 2020
2522020
Weaponized AI for cyber attacks
MM Yamin, M Ullah, H Ullah, B Katt
Journal of Information Security and Applications 57, 102722, 2021
952021
Serious games in science education: a systematic literature
M Ullah, SU Amin, M Munsif, MM Yamin, U Safaev, H Khan, S Khan, ...
Virtual Reality & Intelligent Hardware 4 (3), 189-209, 2022
742022
Serious games as a tool to model attack and defense scenarios for cyber-security exercises
MM Yamin, B Katt, M Nowostawski
Computers & Security 110, 102450, 2021
432021
Attention-based LSTM network for action recognition in sports
M Ullah, MM Yamin, A Mohammed, SD Khan, H Ullah, FA Cheikh
Society for Imaging Science and Technology, 2021
392021
Modeling and executing cyber security exercise scenarios in cyber ranges
MM Yamin, B Katt
Computers & Security 116, 102635, 2022
322022
Cyber Security Skill Set Analysis for Common Curricula Development
MM Yamin, B Katt
International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019
242019
Implementation of insider threat detection system using honeypot based sensors and threat analytics
MM Yamin, B Katt, K Sattar, MB Ahmad
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
212020
Make it and break it: An IoT smart home testbed case study
MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski
Proceedings of the 2nd International Symposium on Computer Science and …, 2018
212018
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
MM Yamin, B Katt
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018
162018
Modeling attack and defense scenarios for cyber security exercises
MM Yamin, B Katt
5th interdisciPlinary cyber research conference 2019, 7, 2019
142019
Mobile device management (MDM) technologies, issues and challenges
MM Yamin, B Katt
Proceedings of the 3rd International Conference on Cryptography, Security …, 2019
132019
Detecting malicious windows commands using natural language processing techniques
MM Yamin, B Katt
Innovative Security Solutions for Information Technology and Communications …, 2019
122019
Use of cyber attack and defense agents in cyber ranges: A case study
MM Yamin, B Katt
Computers & Security 122, 102892, 2022
112022
Smart policing for a smart world opportunities, challenges and way forward
MM Yamin, A Shalaginov, B Katt
Advances in Information and Communication: Proceedings of the 2020 Future of …, 2020
112020
Automatic verification and execution of cyber attack on iot devices
FL Færøy, MM Yamin, A Shukla, B Katt
Sensors 23 (2), 733, 2023
102023
Mapping tools for open source intelligence with cyber kill chain for adversarial aware security
MM Yamin, M Ullah, H Ullah, B Katt, M Hijji, K Muhammad
Mathematics 10 (12), 2054, 2022
82022
Detecting windows based exploit chains by means of event correlation and process monitoring
MM Yamiun, B Katt, V Gkioulos
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
62020
Ontology-based scenario modeling for cyber security exercise
SF Wen, MM Yamin, B Katt
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2021
52021
A Survey of Automated Information Exchange Mechanisms Among CERTs
MM Yamin, B Katt
Collaborative European Research Conference (CERC 2019) Darmstadt, Germany …, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20