| Cyber ranges and security testbeds: Scenarios, functions, tools and architecture MM Yamin, B Katt, V Gkioulos Computers & Security 88, 101636, 2020 | 376 | 2020 |
| Weaponized AI for cyber attacks MM Yamin, M Ullah, H Ullah, B Katt Journal of Information Security and Applications 57, 102722, 2021 | 238 | 2021 |
| Serious games in science education: a systematic literature M Ullah, SU Amin, M Munsif, MM Yamin, U Safaev, H Khan, S Khan, ... Virtual Reality & Intelligent Hardware 4 (3), 189-209, 2022 | 178 | 2022 |
| Advancing fake news detection: Hybrid deep learning with fasttext and explainable ai E Hashmi, SY Yayilgan, MM Yamin, S Ali, M Abomhara IEEE Access 12, 44462-44480, 2024 | 133 | 2024 |
| Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security E Hashmi, MM Yamin, SY Yayilgan AI and Ethics 5 (3), 1911-1929, 2025 | 81 | 2025 |
| Modeling and executing cyber security exercise scenarios in cyber ranges MM Yamin, B Katt Computers & Security 116, 102635, 2022 | 79 | 2022 |
| Applications of LLMs for Generating Cyber Security Exercise Scenarios MM Yamin, E Hashmi, M Ullah, B Katt IEEE Access 12, 143806-143822, 2024 | 71 | 2024 |
| Serious games as a tool to model attack and defense scenarios for cyber-security exercises MM Yamin, B Katt, M Nowostawski Computers & Security 110, 102450, 2021 | 70 | 2021 |
| Attention-based LSTM network for action recognition in sports M Ullah, MM Yamin, A Mohammed, SD Khan, H Ullah, FA Cheikh Society for Imaging Science and Technology, 2021 | 62 | 2021 |
| Enhancing multilingual hate speech detection: From language-specific insights to cross-linguistic integration E Hashmi, SY Yayilgan, IA Hameed, MM Yamin, M Ullah, M Abomhara IEEE Access, 2024 | 33 | 2024 |
| Implementation of insider threat detection system using honeypot based sensors and threat analytics MM Yamin, B Katt, K Sattar, MB Ahmad Future of information and communication conference, 801-829, 2019 | 32 | 2019 |
| Use of cyber attack and defense agents in cyber ranges: A case study MM Yamin, B Katt Computers & Security 122, 102892, 2022 | 28 | 2022 |
| Automatic verification and execution of cyber attack on IoT devices FL Færøy, MM Yamin, A Shukla, B Katt Sensors 23 (2), 733, 2023 | 27 | 2023 |
| Mapping tools for open source intelligence with cyber kill chain for adversarial aware security MM Yamin, M Ullah, H Ullah, B Katt, M Hijji, K Muhammad Mathematics 10 (12), 2054, 2022 | 27 | 2022 |
| Cyber Security Skill Set Analysis for Common Curricula Development MM Yamin, B Katt International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019 | 26 | 2019 |
| Mobile device management (MDM) technologies, issues and challenges MM Yamin, B Katt Proceedings of the 3rd International Conference on Cryptography, Security …, 2019 | 24 | 2019 |
| Make it and break it: An iot smart home testbed case study MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski Proceedings of the 2nd International Symposium on Computer Science and …, 2018 | 23 | 2018 |
| Self-supervised hate speech detection in norwegian texts with lexical and semantic augmentations E Hashmi, SY Yayilgan, MM Yamin, M Abomhara, M Ullah Expert Systems with Applications 264, 125843, 2025 | 22 | 2025 |
| Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper MM Yamin, B Katt Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018 | 20 | 2018 |
| A quantitative framework for security assurance evaluation and selection of cloud services: a case study A Shukla, B Katt, MM Yamin International Journal of Information Security 22 (6), 1621-1650, 2023 | 18 | 2023 |