Muhammad Mudassar Yamin
Cited by
Cited by
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos
Computers & Security 88, 101636, 2020
Make it and break it: An IoT smart home testbed case study
MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski
Proceedings of the 2nd International Symposium on Computer Science and …, 2018
Implementation of insider threat detection system using honeypot based sensors and threat analytics
MM Yamin, B Katt, K Sattar, MB Ahmad
Future of Information and Communication Conference, 801-829, 2019
Smart policing for a smart world opportunities, challenges and way forward
MM Yamin, A Shalaginov, B Katt
Future of Information and Communication Conference, 532-549, 2020
Cyber Security Skill Set Analysis for Common Curricula Development
MM Yamin, B Katt
International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
MM Yamin, B Katt
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018
Mobile device management (MDM) technologies, issues and challenges
MM Yamin, B Katt
Proceedings of the 3rd International Conference on Cryptography, Security …, 2019
Weaponized AI for cyber attacks
MM Yamin, M Ullah, H Ullah, B Katt
Journal of Information Security and Applications 57, 102722, 2021
Modeling attack and defense scenarios for cyber security exercises
MM Yamin, B Katt
5th interdisciPlinary cyber research conference, 7, 2019
Cyber weapons storage mechanisms
MM Yamin, B Katt, M Kianpour
International Conference on Security, Privacy and Anonymity in Computation …, 2019
A Survey of Automated Information Exchange Mechanisms Among CERTs
MM Yamin, B Katt
Collaborative European Research Conference (CERC 2019) Darmstadt, Germany …, 2019
Detecting malicious windows commands using natural language processing techniques
MM Yamin, B Katt
International Conference on Security for Information Technology and …, 2018
sieMS in crisis management: detection, escalation and presentation–a work in progress
G Østby, MM Yamin, B Al Sabbagh
5th InterdisciPlinary Cyber Research Conference, 38, 2019
Detecting windows based exploit chains by means of event correlation and process monitoring
MM Yamiun, B Katt, V Gkioulos
Future of Information and Communication Conference, 1079-1094, 2019
Towards a Common ECSC roadmap
T De Zan, MM Yamin, 2021
Attention-based LSTM network for action recognition in sports
M Ullah, MM Yamin, A Mohammed, SD Khan, H Ullah, FA Cheikh
Society for Imaging Science and Technology, 2021
Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
A Amro, MM Yamin, BJ Knox
International Conference on Human-Computer Interaction, 165-175, 2020
UIOT-FMT: A Universal format for collection and aggregation of data from smart devices
M Seljeseth, MM Yamin, B Katt
Sensors 20 (22), 6662, 2020
Red vs Blue, Cyber Security Simulator
M Dijkstra, CB Tverberg, N Gåsøy
NTNU, 2019
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
MM Yamin, B Katt
CEUR Workshop Proceedings, 2019
The system can't perform the operation now. Try again later.
Articles 1–20