Follow
Arash Mahboubi
Title
Cited by
Cited by
Year
Stochastic modeling of IoT botnet spread: A short survey on mobile malware spread modeling
A Mahboubi, S Camtepe, K Ansari
IEEE access 8, 228818-228830, 2020
292020
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts
A Mahboubi, S Camtepe, H Morarji
IEEE Access 5, 27740-27756, 2017
212017
Compcrypt–lightweight ans-based compression and encryption
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
IEEE Transactions on Information Forensics and Security 16, 3859-3873, 2021
182021
Reducing USB attack surface: A lightweight authentication and delegation protocol
A Mahboubi, S Camtepe, H Morarji
2018 International Conference on Smart Computing and Electronic Enterprise …, 2018
62018
Hybrid service for business contingency plan and recovery service as a disaster recovery framework for cloud computing
F Sabbaghi, A Mahboubi, SH Othman
Journal of Soft Computing and Decision Support Systems 4 (4), 1-10, 2017
52017
A review of state-of-the-art malware attack trends and defense mechanisms
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEE Access 11, 121118-121141, 2023
32023
Using process mining to identify file system metrics impacted by ransomware execution
A Mahboubi, K Ansari, S Camtepe
International Conference on Mobile, Secure, and Programmable Networking, 57-71, 2020
32020
Digital immunity module: Preventing unwanted encryption using source coding
A Mahboubi, K Ansari, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ...
Authorea Preprints, 2023
22023
The compression optimality of asymmetric numeral systems
J Pieprzyk, J Duda, M Pawłowski, S Camtepe, A Mahboubi, P Morawiecki
Entropy 25 (4), 672, 2023
22023
ANS-based compression and encryption with 128-bit security
S Camtepe, J Duda, A Mahboubi, P Morawiecki, S Nepal, M Pawłowski, ...
International Journal of Information Security 21 (5), 1051-1067, 2022
22022
Pseudorandom bit generation with asymmetric numeral systems
J Pieprzyk, M Pawlowski, P Morawiecki, A Mahboubi, J Duda, S Camtepe
Cryptology ePrint Archive, 2022
12022
Malicious Package Detection using Metadata Information
S Halder, M Bewong, A Mahboubi, Y Jiang, R Islam, Z Islam, R Ip, ...
arXiv preprint arXiv:2402.07444, 2024
2024
Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems
HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ...
Computers & Security, 103754, 2024
2024
Discovering Graph Differential Dependencies
Y Zhang, S Kwashie, M Bewong, J Hu, A Mahboubi, X Guo, Z Feng
Australasian Database Conference, 259-272, 2023
2023
A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.
J Ferdous, R Islam, A Mahboubi, MZ Islam
IEEE Access, 2023
2023
Digital Immunity Module: Preventing Unwanted Encryption Digital Immunity Module: Preventing Unwanted Encryption using Source Coding using Source Coding Digital Immunity Module …
K Ansari, A Mahboubi, S Camtepe, J Duda, P Morawiecki, M Pawłowski, ...
TechRxiv 8, 2022
2022
Security of critical information infrastructures exposed to mobile personal devices
A Mahboubi
Queensland University of Technology, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–17