[go: up one dir, main page]

Follow
Mir Mehedi A. Pritom
Mir Mehedi A. Pritom
Assistant Professor of Computer Science, Tennessee Technological University
Verified email at tntech.edu - Homepage
Title
Cited by
Cited by
Year
Blockchain-based automated and robust cyber security management
S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ...
Journal of Parallel and Distributed Computing 163, 62-82, 2022
452022
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns
AM Shibli, MMA Pritom, M Gupta
2024 12th International Symposium on Digital Forensics and Security (ISDFS …, 2024
402024
Characterizing the landscape of covid-19 themed cyberattacks and defenses
MMA Pritom, KM Schweitzer, RM Bateman, M Xu, S Xu
2020 IEEE international conference on intelligence and security informatics …, 2020
352020
Data-driven characterization and detection of covid-19 themed malicious websites
MMA Pritom, KM Schweitzer, RM Bateman, M Xu, S Xu
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
292020
The design of cyber threat hunting games: A case study
MNS Miazi, MMA Pritom, M Shehab, B Chu, J Wei
2017 26th International Conference on Computer Communication and Networks …, 2017
212017
A multiconstrained QoS aware MAC protocol for cluster-based cognitive radio sensor networks
MMA Pritom, S Sarker, MA Razzaque, MM Hassan, MA Hossain, ...
International Journal of Distributed Sensor Networks 11 (5), 262871, 2015
172015
Can features for phishing URL detection be trusted across diverse datasets? A case study with explainable AI
M Mia, D Derakhshan, MMA Pritom
Proceedings of the 11th International Conference on Networking, Systems, and …, 2024
142024
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study
MMA Pritom, S Xu
2022 IEEE Conference on Communications and Network Security (CNS), 2022
142022
Predicting zero-day malicious ip addresses
A Niakanlahiji, MM Pritom, BT Chu, E Al-Shaer
Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017
142017
MRL-PoS: A multi-agent reinforcement learning based proof of stake consensus algorithm for blockchain
T Islam, FH Bappy, TS Zaman, MSI Sajid, MMA Pritom
2024 IEEE 14th Annual Computing and Communication Workshop and Conference …, 2024
112024
A study on log analysis approaches using sandia dataset
MMA Pritom, C Li, B Chu, X Niu
2017 26th International Conference on Computer Communication and Networks …, 2017
102017
Maximizing blockchain performance: Mitigating conflicting transactions through parallelism and dependency management
FH Bappy, TS Zaman, MSI Sajid, MMA Pritom, T Islam
2024 IEEE International Conference on Blockchain (Blockchain), 140-147, 2024
62024
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats
SM Sanjari, AM Shibli, M Mia, M Gupta, MMA Pritom
Proceedings of the Fifteenth ACM Conference on Data and Application Security …, 2025
42025
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
M Mia, MMA Pritom, T Islam, K Hasan
International Conference on Data Mining Workshops (ICDMW), 2024
32024
Method and system for blockchain-based cyber security management
S Xu, HE Songlin, E Ficke, MMA Pritom, C Huashan, Q Tang, Q Chen, ...
US Patent 12,301,592, 2025
22025
Poster: A Few-Shot Learning Method for SMS Phishing Detection and Explanation Using SLMs
SM Sanjari, J Roberts, MMA Pritom
46th IEEE Symposium on Security and Privacy, 1-2, 2025
22025
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
M Mia, MMA Pritom
Accepted at The 7th IEEE International Conference on Trust, Privacy, and …, 2025
2025
Characterizing Event-themed Malicious Web Campaigns: A Case Study on War-Themed Websites
M Mia, MMA Pritom, T Islam, S Xu
The 22nd Annual International Conference on Privacy, Security and Trust (PST …, 2025
2025
Adaptive Intrusion Detection with PPO and Zero Trust Continuous Verification
E Haque, K Hasan, I Ahmed, S Ullah, T Islam, MMA Pritom
IEEE SoutheastCon 2025, 868-873, 2025
2025
System and Methods for Ongoing SMS Phishing Campaign Visualization, Monitoring and Characterization
SM Sanjari, AM Shibli, M Mia, M Gupta, MMA Pritom
Proceedings of Student Research and Creative Inquiry Day 2025 9, 49-50, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20