default search action
Muhammad Mudassar Yamin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Ehtesham Hashmi, Sule Yildirim Yayilgan, Muhammad Mudassar Yamin, Subhan Ali, Mohamed Abomhara:
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI. IEEE Access 12: 44462-44480 (2024) - [j12]Ehtesham Hashmi, Sule Yildirim Yayilgan, Ibrahim A. Hameed, Muhammad Mudassar Yamin, Mohib Ullah, Mohamed Abomhara:
Enhancing Multilingual Hate Speech Detection: From Language-Specific Insights to Cross-Linguistic Integration. IEEE Access 12: 121507-121537 (2024) - [j11]Muhammad Mudassar Yamin, Ehtesham Hashmi, Mohib Ullah, Basel Katt:
Applications of LLMs for Generating Cyber Security Exercise Scenarios. IEEE Access 12: 143806-143822 (2024) - [j10]Abdullah Zafar, Muhammad Mudassar Yamin, Basel Katt, Espen Torseth:
All flags are not created equal: A deep look into CTF Scoring Algorithms. Expert Syst. Appl. 254: 124436 (2024) - [c23]Thang-Anh-Quan Nguyen, Ehtesham Hashmi, Muhammad Mudassar Yamin, Azeddine Beghdadi, Faouzi Alaya Cheikh, Mohib Ullah:
Benign Paroxysmal Positional Vertigo Disorders Classification Using Eye Tracking Data. AIAI (2) 2024: 174-185 - [c22]Muhammad Moosa, Muhammad Mudassar Yamin, Ehtesham Hashmi, Azeddine Beghdadi, Ali Shariq Imran, Faouzi Alaya Cheikh, Mohib Ullah:
SMT: Self-supervised Approach for Multiple Animal Detection and Tracking. AIAI (2) 2024: 307-317 - 2023
- [j9]Ankur Shukla, Basel Katt, Muhammad Mudassar Yamin:
A quantitative framework for security assurance evaluation and selection of cloud services: a case study. Int. J. Inf. Sec. 22(6): 1621-1650 (2023) - [j8]Fartein Lemjan Færøy, Muhammad Mudassar Yamin, Ankur Shukla, Basel Katt:
Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors 23(2): 733 (2023) - [j7]Karl Edvard Balto, Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt:
Hybrid IoT Cyber Range. Sensors 23(6): 3071 (2023) - [c21]Fayaz Rahman, C. B. Dev Narayan, Mohib Ullah, Muhammad Mudassar Yamin, Øyvind Nordbø, Christopher Coello, Ali Shariq Imran, G. Santhosh Kumar, Madhu S. Nair, Faouzi Alaya Cheikh:
Self-supervised animal detection in constrained environment. BMVC Workshop 2023 - [c20]Raphaël Rouquette, Simon Beau, Muhammad Mudassar Yamin, Mohib Ullah, Basel Katt:
Automatic and Realistic Traffic Generation In A Cyber Range. FiCloud 2023: 352-358 - [c19]Saif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, Basel Katt, Ali Shariq Imran, Mohib Ullah:
Data Driven Skill Assessment for Cybersecurity Exercises. FiCloud 2023: 359-366 - [c18]Thinh Pham-Duc, Mohib Ullah, Muhammad Mudassar Yamin, Adane Nega Tarekegn, Azeddine Beghdadi, Faouzi Alaya Cheikh, Habib Ullah:
Attention Guided Deep Neural Network for Animal Ear Tag Classification in Low-Resolution Images. FIT 2023: 61-66 - [c17]Edward Ettesvoll, Leon Camill Rognerud Schüle, Muhammad Mudassar Yamin, Ali Shariq Imran:
Beyond Theory: Investigating the Practical Feasibility of Confidential Computing. FIT 2023: 154-159 - [c16]Lars Halvor Anundskås, Hina Afridi, Adane Nega Tarekegn, Muhammad Mudassar Yamin, Mohib Ullah, Saira Yamin, Faouzi Alaya Cheikh:
Glove-Ing Attention: A Multi-Modal Neural Learning Approach to Image Captioning. ICASSP Workshops 2023: 1-5 - [c15]Muhammad Azhar, Mohib Ullah, Ali Shariq Imran, Muhammad Mudassar Yamin, Sher Muhammad Daudpota, Faouzi Alaya Cheikh:
Cricket Shot Classification using Transformer. ISPA 2023: 1-6 - [c14]Maryam Hassan, Farhan Hussain, Sultan Daud Khan, Mohib Ullah, Muhammad Mudassar Yamin, Habib Ullah:
Crowd counting using deep learning based head detection. Image Processing: Algorithms and Systems 2023: 293-1 - [c13]Aymeric Doussau, Clément Charles Pierre Souyris, Muhammad Mudassar Yamin, Basel Katt, Mohib Ullah:
Intelligent Contextualized Network Traffic Generator in a Cyber Range. SITIS 2023: 9-13 - 2022
- [j6]Muhammad Mudassar Yamin, Basel Katt:
Modeling and executing cyber security exercise scenarios in cyber ranges. Comput. Secur. 116: 102635 (2022) - [j5]Muhammad Mudassar Yamin, Basel Katt:
Use of cyber attack and defense agents in cyber ranges: A case study. Comput. Secur. 122: 102892 (2022) - 2021
- [j4]Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski:
Serious games as a tool to model attack and defense scenarios for cyber-security exercises. Comput. Secur. 110: 102450 (2021) - [j3]Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt:
Weaponized AI for cyber attacks. J. Inf. Secur. Appl. 57: 102722 (2021) - [c12]Mohib Ullah, Muhammad Mudassar Yamin, Ahmed Kedir Mohammed, Sultan Daud Khan, Habib Ullah, Faouzi Alaya Cheikh:
Attention-based LSTM Network for Action Recognition in Sports. IRIACV 2021: 1-6 - [c11]Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt:
Ontology-Based Scenario Modeling for Cyber Security Exercise. EuroS&P Workshops 2021: 249-258 - [c10]Jo Erskine Hannay, Audun Stolpe, Muhammad Mudassar Yamin:
Toward AI-Based Scenario Management for Cyber Range Training. HCI (41) 2021: 423-436 - [c9]Muhammad Mudassar Yamin, Basel Katt, Espen Torseth:
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study. HCI (15) 2021: 462-483 - 2020
- [j2]Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos:
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 88 (2020) - [j1]Mats Seljeseth, Muhammad Mudassar Yamin, Basel Katt:
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices. Sensors 20(22): 6662 (2020) - [c8]Ahmed Amro, Muhammad Mudassar Yamin, Benjamin J. Knox:
Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study. HCI (43) 2020: 165-175
2010 – 2019
- 2019
- [c7]Muhammad Mudassar Yamin, Basel Katt:
Cyber Security Skill Set Analysis for Common Curricula Development. ARES 2019: 37:1-37:8 - [c6]Muhammad Mudassar Yamin, Basel Katt:
A Survey of Automated Information Exchange Mechanisms Among CERTs. CERC 2019: 311-322 - [c5]Muhammad Mudassar Yamin, Basel Katt:
Mobile device management (MDM) technologies, issues and challenges. ICCSP 2019: 143-147 - [c4]Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour:
Cyber Weapons Storage Mechanisms. SpaCCS 2019: 354-367 - 2018
- [c3]Muhammad Mudassar Yamin, Basel Katt:
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper. AAAI Fall Symposium: ALEC 2018: 41-43 - [c2]Muhammad Mudassar Yamin, Basel Katt:
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain. XAILA@JURIX 2018: 33-41 - [c1]Muhammad Mudassar Yamin, Basel Katt:
Detecting Malicious Windows Commands Using Natural Language Processing Techniques. SecITC 2018: 157-169
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint