[go: up one dir, main page]

Follow
Muhammad Mudassar Yamin
Title
Cited by
Cited by
Year
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos
Computers & Security 88, 101636, 2020
3762020
Weaponized AI for cyber attacks
MM Yamin, M Ullah, H Ullah, B Katt
Journal of Information Security and Applications 57, 102722, 2021
2382021
Serious games in science education: a systematic literature
M Ullah, SU Amin, M Munsif, MM Yamin, U Safaev, H Khan, S Khan, ...
Virtual Reality & Intelligent Hardware 4 (3), 189-209, 2022
1782022
Advancing fake news detection: Hybrid deep learning with fasttext and explainable ai
E Hashmi, SY Yayilgan, MM Yamin, S Ali, M Abomhara
IEEE Access 12, 44462-44480, 2024
1332024
Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
E Hashmi, MM Yamin, SY Yayilgan
AI and Ethics 5 (3), 1911-1929, 2025
812025
Modeling and executing cyber security exercise scenarios in cyber ranges
MM Yamin, B Katt
Computers & Security 116, 102635, 2022
792022
Applications of LLMs for Generating Cyber Security Exercise Scenarios
MM Yamin, E Hashmi, M Ullah, B Katt
IEEE Access 12, 143806-143822, 2024
712024
Serious games as a tool to model attack and defense scenarios for cyber-security exercises
MM Yamin, B Katt, M Nowostawski
Computers & Security 110, 102450, 2021
702021
Attention-based LSTM network for action recognition in sports
M Ullah, MM Yamin, A Mohammed, SD Khan, H Ullah, FA Cheikh
Society for Imaging Science and Technology, 2021
622021
Enhancing multilingual hate speech detection: From language-specific insights to cross-linguistic integration
E Hashmi, SY Yayilgan, IA Hameed, MM Yamin, M Ullah, M Abomhara
IEEE Access, 2024
332024
Implementation of insider threat detection system using honeypot based sensors and threat analytics
MM Yamin, B Katt, K Sattar, MB Ahmad
Future of information and communication conference, 801-829, 2019
322019
Use of cyber attack and defense agents in cyber ranges: A case study
MM Yamin, B Katt
Computers & Security 122, 102892, 2022
282022
Automatic verification and execution of cyber attack on IoT devices
FL Færøy, MM Yamin, A Shukla, B Katt
Sensors 23 (2), 733, 2023
272023
Mapping tools for open source intelligence with cyber kill chain for adversarial aware security
MM Yamin, M Ullah, H Ullah, B Katt, M Hijji, K Muhammad
Mathematics 10 (12), 2054, 2022
272022
Cyber Security Skill Set Analysis for Common Curricula Development
MM Yamin, B Katt
International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019
262019
Mobile device management (MDM) technologies, issues and challenges
MM Yamin, B Katt
Proceedings of the 3rd International Conference on Cryptography, Security …, 2019
242019
Make it and break it: An iot smart home testbed case study
MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski
Proceedings of the 2nd International Symposium on Computer Science and …, 2018
232018
Self-supervised hate speech detection in norwegian texts with lexical and semantic augmentations
E Hashmi, SY Yayilgan, MM Yamin, M Abomhara, M Ullah
Expert Systems with Applications 264, 125843, 2025
222025
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
MM Yamin, B Katt
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018
202018
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
A Shukla, B Katt, MM Yamin
International Journal of Information Security 22 (6), 1621-1650, 2023
182023
The system can't perform the operation now. Try again later.
Articles 1–20