Is rssi a reliable parameter in sensor localization algorithms: An experimental study AT Parameswaran, MI Husain, S Upadhyaya Field failure data analysis workshop (F2DA09) 5, 2009 | 239 | 2009 |
iForensics: forensic analysis of instant messaging on smart phones MI Husain, R Sridhar Digital Forensics and Cyber Crime: First International ICST Conference
, 2010 | 81 | 2010 |
Covert botnet command and control using twitter N Pantic, MI Husain Proceedings of the 31st annual computer security applications conference
, 2015 | 48 | 2015 |
A simple cost-effective framework for iPhone forensic analysis MI Husain, I Baggili, R Sridhar Digital Forensics and Cyber Crime: Second International ICST Conference
, 2011 | 45 | 2011 |
CD-PHY: Physical layer security in wireless networks through constellation diversity MI Husain, S Mahant, R Sridhar MILCOM 2012-2012 IEEE Military Communications Conference, 1-9, 2012 | 39 | 2012 |
Security analysis of mobile money applications on android H Darvish, M Husain 2018 IEEE International Conference on Big Data (Big Data), 3072-3078, 2018 | 28 | 2018 |
Dynamic security analysis of zoom, Google meet and Microsoft teams NH Gauthier, MI Husain Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San
, 2021 | 26 | 2021 |
IDKEYMAN: An identity-based key management scheme for wireless ad hoc body area networks S Sankaran, MI Husain, R Sridhar The 5th Annual Symposium on Information Assurance (ASIA'09), 2009 | 19 | 2009 |
Towards building a word similarity dictionary for personality bias classification of phishing email contents K Ding, N Pantic, Y Lu, S Manna, MI Husain Proceedings of the 2015 IEEE 9th International Conference on Semantic
, 2015 | 15 | 2015 |
Bidirectional data verification for cloud storage MI Husain, SY Ko, S Uurtamo, A Rudra, R Sridhar Journal of network and computer applications 45, 96-107, 2014 | 13 | 2014 |
Lightweight reconfigurable encryption architecture for moving target defense MI Husain, K Courtright, R Sridhar MILCOM 2013-2013 IEEE Military Communications Conference, 214-219, 2013 | 10 | 2013 |
A decision support system for personality based phishing susceptibility analysis N Pantic, M Husain 2018 IEEE International Conference on Big Data (Big Data), 3066-3071, 2018 | 9 | 2018 |
Raspberry PI 3 Home Network Monitoring Tool G Kutukian | 7 | 2016 |
Design and development of a mobile EEG data analytics framework L Gutierrez, M Husain 2019 IEEE Fifth International Conference on Big Data Computing Service and
, 2019 | 6 | 2019 |
LASE: Latency aware simple encryption for embedded systems security K Courtright, MI Husain, R Sridhar International journal of computer science and network security 9 (10), 1-6, 2009 | 6 | 2009 |
Is RSSI a Reliable Parameter in Sensor Localization Algorithms AT Parameswaran, MI Husain, S Upadhyaya An Experimental Study, Field Failure Data Analysis Workshop, 5, 2009 | 6 | 2009 |
System and method for secure authentication of a subscriber of network services M Husain, M Desai US Patent App. 11/269,153, 2006 | 6 | 2006 |
The relationship between previous trauma and alcohol and substance misuse in women M Husain, K Moosa, K Khan European Psychiatry 33 (S1), S301-S301, 2016 | 5 | 2016 |
Facebook Privacy Management Simplified SW Fang, D Rajamanthri, M Husain 2015 12th International Conference on Information Technology-New Generations
, 2015 | 5 | 2015 |
Implementation vulnerability associated with OAuth 2.0--A case study on Dropbox B Wu, T Nguyen, M Husain 2015 12th International Conference on Information Technology-New Generations
, 2015 | 5 | 2015 |