Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Tell Them from Me: An Encrypted Application Profiler

    Profiling internet users associated with encrypted applications has been a long-standing challenging issue that helps to identify targeted users’ interests. This paper proposes a machine-learning based solutio...

    Mohammad Mamun, Rongxing Lu, Manon Gaudet in Network and System Security (2019)

  2. No Access

    Chapter and Conference Paper

    TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining

    Host behaviour modelling is widely deployed in today’s corporate environments to aid in the detection and analysis of cyber attacks. Audit logs containing system-level events are frequently used for behavior m...

    Mohammad Mamun, Scott Buffett in Information and Communications Security (2022)

  3. No Access

    Chapter

    Security and Privacy of IoT Devices for Aging in Place

    The rising cost of elderly living and care facilities prompts for other solutions for the elderly people where aging in place is one of the ways to solve this issue using emerging technologies centered around ...

    Noel Khaemba, Issa Traoré, Mohammad Mamun in Artificial Intelligence for Cyber-Physical… (2023)