default search action
Mohammad Saiful Islam Mamun
Person information
- affiliation: Cybersecurity, National Research Council Canada, Ottawa, ON, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Guojun Tang, Rongxing Lu, Mohammad Mamun:
WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data. Int. J. Appl. Cryptogr. 4(3/4): 143-155 (2024) - [j15]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Effect of Text Augmentation and Adversarial Training on Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 4775-4789 (2024) - [j14]William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Federated Supervised Principal Component Analysis. IEEE Trans. Inf. Forensics Secur. 19: 646-660 (2024) - 2023
- [j13]Noel Khaemba, Issa Traoré, Mohammad Mamun:
A Framework for Synthetic Agetech Attack Data Generation. J. Cybersecur. Priv. 3(4): 744-757 (2023) - [j12]Mehdi Hazratifard, Vibhav Agrawal, Fayez Gebali, Haytham Elmiligi, Mohammad Mamun:
Ensemble Siamese Network (ESN) Using ECG Signals for Human Authentication in Smart Healthcare System. Sensors 23(10): 4727 (2023) - [j11]Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:
SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place. Sensors 23(15): 6752 (2023) - 2022
- [j10]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. J. Inf. Secur. Appl. 65: 103121 (2022) - [j9]Mehdi Hazratifard, Fayez Gebali, Mohammad Mamun:
Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial. Sensors 22(19): 7655 (2022) - 2021
- [j8]Moneer Fakroon, Fayez Gebali, Mohammad Saiful Islam Mamun:
Multifactor authentication scheme using physically unclonable functions. Internet Things 13: 100343 (2021) - [j7]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Automated detection of unstructured context-dependent sensitive information using deep learning. Internet Things 16: 100444 (2021) - [j6]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Rongxing Lu, Chunhua Su:
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. Peer-to-Peer Netw. Appl. 14(2): 708-721 (2021) - [j5]William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Machine learning in precision medicine to preserve privacy via encryption. Pattern Recognit. Lett. 151: 148-154 (2021) - 2018
- [j4]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen:
SupAUTH: A new approach to supply chain authentication for the IoT. Comput. Intell. 34(2): 582-602 (2018) - [j3]Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali A. Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. J. Inf. Secur. Appl. 43: 73-82 (2018) - 2015
- [j2]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A privacy-preserving efficient RFID authentication protocol from SLPN assumption. Int. J. Comput. Sci. Eng. 10(3): 234-243 (2015) - [j1]Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An efficient batch verification system and its effect in a real time VANET environment. Secur. Commun. Networks 8(2): 298-310 (2015)
Conference and Workshop Papers
- 2024
- [c20]Jinkun Gui, Yantao Yu, Zeming Zhou, Rongxing Lu, Mohammad Saiful Islam Mamun:
An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems. ICC 2024: 2676-2681 - 2023
- [c19]Vishnu Prasanth Vikraman Pillai, Zeming Zhou, Songnian Zhang, Rongxing Lu, Mohammad Mamun:
An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems. ICCC 2023: 1-6 - [c18]Songnian Zhang, Zeming Zhou, Jinkun Gui, Rongxing Lu, Mohammad Mamun:
A Lightweight Mutual Authentication Scheme with Fault Tolerance in Smart Elderly Care System. ICCC 2023: 1-6 - [c17]Ala' Alqaisi, Sherif Saad, Mohammad Mamun:
Trustworthy Decentralized Last-Mile Delivery Framework Using Blockchain. ICSBT 2023: 54-65 - [c16]Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:
Detecting BrakTooth Attacks. SECRYPT 2023: 787-792 - 2022
- [c15]Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. ICICS 2022: 546-565 - 2021
- [c14]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. DASC/PiCom/CBDCom/CyberSciTech 2021: 51-59 - [c13]Mohammad Mamun, Kevin Shi:
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning. TrustCom 2021: 693-700 - 2020
- [c12]Yandong Zheng, Rongxing Lu, Mohammad Saiful Islam Mamun:
Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare. ICC 2020: 1-6 - 2019
- [c11]Mohammad Saiful Islam Mamun, Rongxing Lu, Manon Gaudet:
Tell Them from Me: An Encrypted Application Profiler. NSS 2019: 456-471 - 2017
- [c10]Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Tor Traffic using Time based Features. ICISSP 2017: 253-262 - 2016
- [c9]Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Encrypted and VPN Traffic using Time-related Features. ICISSP 2016: 407-414 - [c8]Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. NSS 2016: 467-482 - 2015
- [c7]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova:
An Entropy Based Encrypted Traffic Classifier. ICICS 2015: 282-294 - 2014
- [c6]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
RFID Path Authentication, Revisited. AINA 2014: 245-252 - [c5]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Scalable and Secure RFID Ownership Transfer Protocol. AINA 2014: 343-350 - [c4]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Hiroaki Takada:
A Multi-purpose Group Signature for Vehicular Network Security. NBiS 2014: 511-516 - [c3]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Secure VANET applications with a refined group signature. PST 2014: 199-206 - 2013
- [c2]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption. TrustCom/ISPA/IUCC 2013: 102-109 - 2012
- [c1]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman:
A Secure and Private RFID Authentication Protocol under SLPN Problem. NSS 2012: 476-489
Informal and Other Publications
- 2023
- [i14]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Saiful Islam Mamun, Issa Traoré:
Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering. CoRR abs/2301.07527 (2023) - [i13]Andrew A. Naguib, Waleed A. Yousef, Issa Traoré, Mohammad Saiful Islam Mamun:
On Statistical Learning of Branch and Bound for Vehicle Routing Optimization. CoRR abs/2310.09986 (2023) - [i12]Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. CoRR abs/2312.07575 (2023) - 2021
- [i11]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a Robust and Trustworthy Machine Learning System Development. CoRR abs/2101.03042 (2021) - [i10]William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Machine Learning in Precision Medicine to Preserve Privacy via Encryption. CoRR abs/2102.03412 (2021) - [i9]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. CoRR abs/2108.08441 (2021) - [i8]Mohammad Mamun, Kevin Shi:
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning. CoRR abs/2108.13989 (2021) - 2013
- [i7]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Group Signature with relaxed-privacy and revocability for VANET. IACR Cryptol. ePrint Arch. 2013: 804 (2013) - 2012
- [i6]A. F. M. Sultanul Kabir, Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun:
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure. CoRR abs/1208.3769 (2012) - [i5]Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen, Mohammad Saiful Islam Mamun:
A Novel Overlay IDS For Wireless Sensor Networks. CoRR abs/1208.3771 (2012) - [i4]Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir:
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network. CoRR abs/1208.3772 (2012) - [i3]A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun:
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information. CoRR abs/1208.3774 (2012) - [i2]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An Optimized Signature Verification System for Vehicle Ad hoc NETwork. CoRR abs/1208.5096 (2012) - [i1]Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir, Md. Sakhawat Hossen, Razib Hayat Khan:
Policy based intrusion detection and response system in hierarchical WSN architecture. CoRR abs/1209.1678 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint