Muhammad Mudassar Yamin
Cited by
Cited by
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos
Computers & Security 88, 101636, 2020
Make it and break it: An IoT smart home testbed case study
MM Yamin, B Katt, E Torseth, V Gkioulos, SJ Kowalski
Proceedings of the 2nd International Symposium on Computer Science and …, 2018
Implementation of insider threat detection system using honeypot based sensors and threat analytics
MM Yamin, B Katt, K Sattar, MB Ahmad
Future of Information and Communication Conference, 801-829, 2019
Cyber Security Skill Set Analysis for Common Curricula Development
MM Yamin, B Katt
International Journal of Information Security and Cybercrime 8 (1), 59-64, 2019
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
MM Yamin, B Katt
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and …, 2018
Mobile device management (MDM) technologies, issues and challenges
MM Yamin, B Katt
Proceedings of the 3rd International Conference on Cryptography, Security …, 2019
Modeling attack and defense scenarios for cyber security exercises
MM Yamin, B Katt
5th interdisciPlinary cyber research conference 2019, 7, 2019
A Survey of Automated Information Exchange Mechanisms Among CERTs
MM Yamin, B Katt
Collaborative European Research Conference (CERC 2019) Darmstadt, Germany …, 2019
Smart Policing for a Smart World Opportunities, Challenges and Way Forward
MM Yamin, A Shalaginov, B Katt
Future of Information and Communication Conference, 532-549, 2020
Cyber weapons storage mechanisms
MM Yamin, B Katt, M Kianpour
International Conference on Security, Privacy and Anonymity in Computation …, 2019
sieMS in crisis management: detection, escalation and presentation–a work in progress
G Østby, MM Yamin, B Al Sabbagh
5th InterdisciPlinary Cyber Research Conference, 38, 2019
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
MM Yamiun, B Katt, V Gkioulos
Future of Information and Communication Conference, 1079-1094, 2019
Detecting Malicious Windows Commands Using Natural Language Processing Techniques
MM Yamin, B Katt
International Conference on Security for Information Technology and …, 2018
Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
A Amro, MM Yamin, BJ Knox
International Conference on Human-Computer Interaction, 165-175, 2020
UIOT-FMT: A Universal format for collection and aggregation of data from smart devices
M Seljeseth, MM Yamin, B Katt
Sensors 20 (22), 6662, 2020
Red vs Blue, Cyber Security Simulator
M Dijkstra, CB Tverberg, N Gåsøy
NTNU, 2019
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
MM Yamin, B Katt
CEUR Workshop Proceedings, 2019
Implementation of information security techniques on modern android based Kiosk ATM/remittance machines
KM Awan, Z ur Rehman, MM Yamin, PA Shah
2017 International Conference on Information and Communication Technologies …, 2017
The system can't perform the operation now. Try again later.
Articles 1–18