Follow
Mohammad Iftekhar Husain
Mohammad Iftekhar Husain
California State Polytechnic University (Cal Poly Pomona)
Verified email at cpp.edu - Homepage
Title
Cited by
Cited by
Year
Is rssi a reliable parameter in sensor localization algorithms: An experimental study
AT Parameswaran, MI Husain, S Upadhyaya
Field failure data analysis workshop (F2DA09) 5, 2009
2322009
iForensics: forensic analysis of instant messaging on smart phones
MI Husain, R Sridhar
Digital Forensics and Cyber Crime: First International ICST Conference …, 2010
792010
A simple cost-effective framework for iPhone forensic analysis
MI Husain, I Baggili, R Sridhar
Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011
432011
Covert botnet command and control using twitter
N Pantic, MI Husain
Proceedings of the 31st annual computer security applications conference …, 2015
412015
CD-PHY: Physical layer security in wireless networks through constellation diversity
MI Husain, S Mahant, R Sridhar
MILCOM 2012-2012 IEEE Military Communications Conference, 1-9, 2012
382012
Security analysis of mobile money applications on android
H Darvish, M Husain
2018 IEEE International Conference on Big Data (Big Data), 3072-3078, 2018
192018
IDKEYMAN: An identity-based key management scheme for wireless ad hoc body area networks
S Sankaran, MI Husain, R Sridhar
The 5th Annual Symposium on Information Assurance (ASIA'09), 2009
182009
Dynamic security analysis of zoom, Google meet and Microsoft teams
NH Gauthier, MI Husain
Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San …, 2021
172021
Towards building a word similarity dictionary for personality bias classification of phishing email contents
K Ding, N Pantic, Y Lu, S Manna, MI Husain
Proceedings of the 2015 IEEE 9th International Conference on Semantic …, 2015
152015
Bidirectional data verification for cloud storage
MI Husain, SY Ko, S Uurtamo, A Rudra, R Sridhar
Journal of network and computer applications 45, 96-107, 2014
112014
Lightweight reconfigurable encryption architecture for moving target defense
MI Husain, K Courtright, R Sridhar
MILCOM 2013-2013 IEEE Military Communications Conference, 214-219, 2013
102013
A decision support system for personality based phishing susceptibility analysis
N Pantic, M Husain
2018 IEEE International Conference on Big Data (Big Data), 3066-3071, 2018
72018
Raspberry PI 3 Home Network Monitoring Tool
G Kutukian
62016
Facebook Privacy Management Simplified
SW Fang, D Rajamanthri, M Husain
2015 12th International Conference on Information Technology-New Generations …, 2015
62015
LASE: Latency aware simple encryption for embedded systems security
K Courtright, MI Husain, R Sridhar
International journal of computer science and network security 9 (10), 1-6, 2009
62009
Is RSSI a Reliable Parameter in Sensor Localization Algorithms
AT Parameswaran, MI Husain, S Upadhyaya
An Experimental Study, Field Failure Data Analysis Workshop, 5, 2009
62009
System and method for secure authentication of a subscriber of network services
M Husain, M Desai
US Patent App. 11/269,153, 2006
62006
Design and development of a mobile EEG data analytics framework
L Gutierrez, M Husain
2019 IEEE Fifth International Conference on Big Data Computing Service and …, 2019
52019
Implementation vulnerability associated with OAuth 2.0--A case study on Dropbox
B Wu, T Nguyen, M Husain
2015 12th International Conference on Information Technology-New Generations …, 2015
52015
The relationship between previous trauma and alcohol and substance misuse in women
M Husain, K Moosa, K Khan
European Psychiatry 33 (S1), S301-S301, 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20