default search action
Ambareen Siraj
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware. Int. J. Inf. Sec. 23(1): 533-556 (2024) - 2023
- [c45]Md. Ahsan Ayub, Ambareen Siraj:
Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time. CIC 2023: 1-10 - [c44]Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware. TrustCom 2023: 1673-1680 - 2021
- [j4]Ibrahim Yilmaz, Ambareen Siraj:
Avoiding Occupancy Detection From Smart Meter Using Adversarial Machine Learning. IEEE Access 9: 35411-35430 (2021) - [c43]Kendall Land, Ambareen Siraj:
Blockchain Based Farm-to-Fork Supply Chain Tracking. IEEE BigData 2021: 3416-3425 - [c42]Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef:
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning. SAT-CPS@CODASPY 2021: 33-38 - [c41]Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal:
Is there a Security Mindset and Can it be Taught? CODASPY 2021: 335-336 - [c40]Md. Ahsan Ayub, Steven Smith, Ambareen Siraj, Paul Tinker:
Domain Generating Algorithm based Malicious Domains Detection. CSCloud/EdgeCom 2021: 77-82 - [c39]Richard Weiss, Jens Mache, Elizabeth K. Hawthorne, Ambareen Siraj, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021. SIGCSE 2021: 1358 - [c38]Md. Ahsan Ayub, Ambareen Siraj:
Similarity Analysis of Ransomware based on Portable Executable (PE) File Metadata. SSCI 2021: 1-6 - [i5]Ibrahim Yilmaz, Ambareen Siraj, Denis A. Ulybyshev:
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning. CoRR abs/2101.00521 (2021) - [i4]Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef:
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning. CoRR abs/2101.06308 (2021) - 2020
- [c37]Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, Mike Rogers:
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response. AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering (1) 2020 - [c36]Md. Ahsan Ayub, William A. Johnson, Douglas A. Talbert, Ambareen Siraj:
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning. CISS 2020: 1-6 - [c35]Susan Jeziorowski, Muhammad Ismail, Ambareen Siraj:
Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces. IWSPA@CODASPY 2020: 15-22 - [c34]Ibrahim Yilmaz, Rahat Masum, Ambareen Siraj:
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection. IRI 2020: 25-30 - [c33]Md. Ahsan Ayub, Andrea Continella, Ambareen Siraj:
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network. IRI 2020: 319-324 - [i3]Ibrahim Yilmaz, Ambareen Siraj:
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning. CoRR abs/2010.12640 (2020)
2010 – 2019
- 2019
- [c32]Md. Ahsan Ayub, Steven Smith, Ambareen Siraj:
A Protocol Independent Approach in Network Covert Channel Detection. CSE/EUC 2019: 165-170 - [c31]Terry N. Guo, Animesh Dahal, Ambareen Siraj:
Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment?. MLDM (1) 2019: 319-332 - [i2]Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, Mike Rogers:
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response. CoRR abs/1911.09853 (2019) - [i1]Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, Ambareen Siraj:
Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy. CoRR abs/1911.09858 (2019) - 2018
- [c30]Terry N. Guo, Damon Khoo, Michael Coultis, Marbin Pazos-Revilla, Ambareen Siraj:
Poster Abstract: IoT Platform for Engineering Education and Research (IoT PEER)-Applications in Secure and Smart Manufacturing. IoTDI 2018: 277-278 - [c29]Ambareen Siraj, Sheikh K. Ghafoor:
CReST-Security Knitting Kit: Readily Available Teaching Resources to Integrate Security Topics into Traditional CS Courses (Abstract Only). SIGCSE 2018: 1058 - [c28]Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, Michael E. Locasto:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). SIGCSE 2018: 1070 - [c27]Anshu Bhattarai, Ambareen Siraj:
Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems. UEMCON 2018: 70-76 - [c26]Vitaly Ford, Daniel Tyler, Ambareen Siraj:
AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation. CSET @ USENIX Security Symposium 2018 - 2017
- [j3]Vitaly Ford, Ambareen Siraj, Mohammad Ashiqur Rahman:
Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis. J. Comput. Syst. Sci. 83(1): 84-100 (2017) - [c25]Vitaly Ford, Ambareen Siraj, Ada Haynes, Eric L. Brown:
Capture the Flag Unplugged: an Offline Cyber Competition. SIGCSE 2017: 225-230 - [c24]Richard S. Weiss, Ambareen Siraj, Jens Mache, Elizabeth K. Hawthorne, Blair Taylor, Siddharth Kaza, Michael E. Locasto:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). SIGCSE 2017: 732 - 2016
- [c23]Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, Laurin Buchanan:
CySCom: Cybersecurity COMics. ISI 2016: 282-284 - [c22]Richard Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Siddharth Kaza, Ambareen Siraj:
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only). SIGCSE 2016: 709 - [c21]Ambareen Siraj, Sheikh K. Ghafoor:
CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into Upper Division CS Courses (Abstract Only). SIGCSE 2016: 711 - 2015
- [j2]Ambareen Siraj, Blair Taylor, Siddharth Kaza, Sheikh K. Ghafoor:
Integrating security in the computer science curriculum. Inroads 6(2): 77-81 (2015) - [c20]Lenin Mookiah, William Eberle, Ambareen Siraj:
Survey of Crime Analysis and Prediction. FLAIRS 2015: 440-443 - [c19]Khaled Rabieh, Mohamed Mahmoud, Ambareen Siraj, Jelena V. Misic:
Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks. GLOBECOM 2015: 1-6 - [c18]Christa Cody, Vitaly Ford, Ambareen Siraj:
Decision Tree Learning for Fraud Detection in Consumer Energy Consumption. ICMLA 2015: 1175-1179 - [c17]Vitaly Ford, Ambareen Siraj:
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. SecureComm 2015: 563-566 - [c16]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Justin Cappos, Ambareen Siraj:
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only). SIGCSE 2015: 695 - 2014
- [c15]Vitaly Ford, Ambareen Siraj, William Eberle:
Smart grid energy fraud detection using artificial neural networks. CIASG 2014: 91-96 - [c14]Ambareen Siraj, Sheikh K. Ghafoor, Joshua Tower, Ada Haynes:
Empowering faculty to embed security topics into computer science courses. ITiCSE 2014: 99-104 - [c13]Martha J. Kosa, Ambareen Siraj:
The rising renaissance engineer spectrum awards (abstract only). SIGCSE 2014: 717-718 - 2013
- [c12]Vitaly Ford, Ambareen Siraj:
Clustering of smart meter data for disaggregation. GlobalSIP 2013: 507-510 - [c11]Joseph Stites, Ambareen Siraj, Eric L. Brown:
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed. InfoSecCD 2013: 105-110 - [c10]Ambareen Siraj, Blair Taylor, Stephen Cooper:
Bringing security into traditional computer science courses: challenges and support (abstract only). SIGCSE 2013: 747 - 2012
- [c9]Ambareen Siraj, Martha J. Kosa, Summer-Mistine Olmstead:
Weaving a tapestry: creating a satellite workshop to support HS CS teachers in attracting and engaging students. SIGCSE 2012: 493-498 - 2011
- [c8]Marbin Pazos-Revilla, Ambareen Siraj:
An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System. CATA 2011: 39-45 - 2010
- [c7]Joseph L. McDaniel, Ambareen Siraj:
Towards a secure Frequency Monitoring NETwork (FNET) system. CSIIRW 2010: 42
2000 – 2009
- 2009
- [c6]Ambareen Siraj:
Data fusion for improved situational understanding. CSIIRW 2009: 37 - 2008
- [c5]Brandon M. Malone, Ambareen Siraj:
Tracking requirements and threats for secure software development. ACM Southeast Regional Conference 2008: 278-281 - 2007
- [c4]Ambareen Siraj, Rayford B. Vaughn:
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment. CAINE 2007: 278-283 - 2005
- [c3]Ambareen Siraj, Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment. ISI 2005: 218-230 - 2004
- [j1]Ambareen Siraj, Rayford B. Vaughn, Susan M. Bridges:
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture. Int. J. Inf. Technol. Decis. Mak. 3(2): 281-306 (2004) - [c2]Ambareen Siraj, Rayford B. Vaughn, Susan Bridges:
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. HICSS 2004 - 2003
- [c1]Rayford B. Vaughn, Ronda R. Henning, Ambareen Siraj:
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. HICSS 2003: 331
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint