Stebėti
Mohammad Iftekhar Husain
Mohammad Iftekhar Husain
California State Polytechnic University (Cal Poly Pomona)
Patvirtintas el. paštas cpp.edu - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Is rssi a reliable parameter in sensor localization algorithms: An experimental study
AT Parameswaran, MI Husain, S Upadhyaya
Field failure data analysis workshop (F2DA09) 5, 2009
2292009
iForensics: forensic analysis of instant messaging on smart phones
MI Husain, R Sridhar
Digital Forensics and Cyber Crime: First International ICST Conference …, 2010
762010
Covert botnet command and control using twitter
N Pantic, MI Husain
Proceedings of the 31st annual computer security applications conference …, 2015
412015
A simple cost-effective framework for iPhone forensic analysis
MI Husain, I Baggili, R Sridhar
Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011
412011
CD-PHY: Physical layer security in wireless networks through constellation diversity
MI Husain, S Mahant, R Sridhar
MILCOM 2012-2012 IEEE Military Communications Conference, 1-9, 2012
382012
Security analysis of mobile money applications on android
H Darvish, M Husain
2018 IEEE International Conference on Big Data (Big Data), 3072-3078, 2018
182018
IDKEYMAN: An identity-based key management scheme for wireless ad hoc body area networks
S Sankaran, MI Husain, R Sridhar
The 5th Annual Symposium on Information Assurance (ASIA'09), 2009
172009
Dynamic security analysis of zoom, Google meet and Microsoft teams
NH Gauthier, MI Husain
Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San …, 2021
162021
Towards building a word similarity dictionary for personality bias classification of phishing email contents
K Ding, N Pantic, Y Lu, S Manna, MI Husain
Proceedings of the 2015 IEEE 9th International Conference on Semantic …, 2015
142015
Bidirectional data verification for cloud storage
MI Husain, SY Ko, S Uurtamo, A Rudra, R Sridhar
Journal of network and computer applications 45, 96-107, 2014
112014
Lightweight reconfigurable encryption architecture for moving target defense
MI Husain, K Courtright, R Sridhar
MILCOM 2013-2013 IEEE Military Communications Conference, 214-219, 2013
112013
A decision support system for personality based phishing susceptibility analysis
N Pantic, M Husain
2018 IEEE International Conference on Big Data (Big Data), 3066-3071, 2018
72018
Raspberry PI 3 Home Network Monitoring Tool
G Kutukian
62016
LASE: Latency aware simple encryption for embedded systems security
K Courtright, MI Husain, R Sridhar
International journal of computer science and network security 9 (10), 1-6, 2009
62009
Is RSSI a Reliable Parameter in Sensor Localization Algorithms
AT Parameswaran, MI Husain, S Upadhyaya
An Experimental Study, Field Failure Data Analysis Workshop, 5, 2009
62009
System and method for secure authentication of a subscriber of network services
M Husain, M Desai
US Patent App. 11/269,153, 2006
62006
Design and development of a mobile EEG data analytics framework
L Gutierrez, M Husain
2019 IEEE Fifth International Conference on Big Data Computing Service and …, 2019
52019
Facebook Privacy Management Simplified
SW Fang, D Rajamanthri, M Husain
2015 12th International Conference on Information Technology-New Generations …, 2015
52015
Implementation vulnerability associated with OAuth 2.0--A case study on Dropbox
B Wu, T Nguyen, M Husain
2015 12th International Conference on Information Technology-New Generations …, 2015
52015
An authentication system using neurological responses to music
JM Cauthen, T Gandre, MAM Espinoza, MJ Patel, MI Husain
2019 IEEE International Conference on Big Data (Big Data), 6001-6003, 2019
42019
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20