default search action
Akbar Siami Namin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j27]Zulfiqar Ali Khan, Akbar Siami Namin:
Involuntary Transfer: A Vulnerability Pattern in Smart Contracts. IEEE Access 12: 62459-62479 (2024) - [j26]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey of Vulnerability Detection Techniques by Smart Contract Tools. IEEE Access 12: 70870-70910 (2024) - [j25]Saroj Gopali, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets. IEEE Access 12: 136451-136465 (2024) - [c86]Tien Nguyen, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data. COMPSAC 2024: 376-381 - [c85]Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models. COMPSAC 2024: 1739-1746 - [c84]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. SAC 2024: 1064-1066 - [i28]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. CoRR abs/2404.09802 (2024) - [i27]Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models. CoRR abs/2405.19578 (2024) - 2023
- [j24]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin:
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests. Hum. Factors 65(2): 275-287 (2023) - [c83]Zulfiqar Ali Khan, Akbar Siami Namin:
Dynamic Analysis for the Detection of Locked Ether Smart Contracts. IEEE Big Data 2023: 2466-2472 - [c82]Denish Omondi Otieno, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Detecting Phishing URLs using the BERT Transformer Model. IEEE Big Data 2023: 2483-2492 - [c81]Bharkavi Sachithanandam, Akbar Siami Namin, Faranak Abri:
The Performance of Machine and Deep Learning Algorithms in Detecting Fake Reviews. IEEE Big Data 2023: 2499-2507 - [c80]Sonali Singh, Faranak Abri, Akbar Siami Namin:
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles. IEEE Big Data 2023: 2508-2517 - [c79]Zulfiqar Ali Khan, Akbar Siami Namin:
Dynamic Analysis for Detection of Self-Destructive Smart Contracts. COMPSAC 2023: 1093-1100 - [c78]Denish Omondi Otieno, Akbar Siami Namin, Keith S. Jones:
The Application of the BERT Transformer Model for Phishing Email Classification. COMPSAC 2023: 1303-1310 - [c77]Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin:
A Survey on Blockchain-Based Federated Learning and Data Privacy. COMPSAC 2023: 1311-1318 - [i26]Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin:
A Survey on Blockchain-Based Federated Learning and Data Privacy. CoRR abs/2306.17338 (2023) - [i25]Sonali Singh, Faranak Abri, Akbar Siami Namin:
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles. CoRR abs/2311.14876 (2023) - 2022
- [j23]Luis Felipe Gutiérrez, Akbar Siami Namin:
ContextMiner: Mining Contextual Features for Conceptualizing Knowledge in Security Texts. IEEE Access 10: 85891-85904 (2022) - [j22]Huyen N. Nguyen, Faranak Abri, Vung Pham, Moitrayee Chatterjee, Akbar Siami Namin, Tommy Dang:
MalView: Interactive Visual Analytics for Comprehending Malware Behavior. IEEE Access 10: 99909-99930 (2022) - [j21]Faranak Abri, Jianjun Zheng, Akbar Siami Namin, Keith S. Jones:
Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies. IEEE Access 10: 109949-109968 (2022) - [j20]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong:
How do non experts think about cyber attack consequences? Inf. Comput. Secur. 30(4): 473-489 (2022) - [j19]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong:
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. J. Multimodal User Interfaces 16(4): 399-412 (2022) - [c76]Luis Felipe Gutiérrez, Akbar Siami Namin:
Generating Interpretable Features for Context-Aware Document Clustering: A Cybersecurity Case Study. IEEE Big Data 2022: 740-747 - [c75]Ayda Demir, Luis Felipe Gutiérrez, Akbar Siami Namin, Stephen B. Bayne:
Solar Irradiance Prediction Using Transformer-based Machine Learning Models. IEEE Big Data 2022: 2833-2840 - [c74]Bimal Karki, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Using Transformers for Identification of Persuasion Principles in Phishing Emails. IEEE Big Data 2022: 2841-2848 - [c73]Shannon Angel, Akbar Siami Namin:
Conceptual Mappings of Conventional Software and Machine Learning-based Applications Development. COMPSAC 2022: 1223-1230 - [c72]Saroj Gopali, Zulfiqar Ali Khan, Bipin Chhetri, Bimal Karki, Akbar Siami Namin:
Vulnerability Detection in Smart Contracts Using Deep Learning. COMPSAC 2022: 1249-1255 - [c71]Prerit Datta, Akbar Siami Namin, Keith S. Jones:
Can We Predict Consequences of Cyber Attacks? ICMLA 2022: 1047-1054 - [c70]Prerit Datta, Sara Sartoli, Luis Felipe Gutiérrez, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
A user-centric threat model and repository for cyber attacks. SAC 2022: 1341-1346 - 2021
- [j18]Zahra Sadat Shariatmadar, Karim Faez, Akbar Siami Namin:
Sal-HMAX: An Enhanced HMAX Model in Conjunction With a Visual Attention Mechanism to Improve Object Recognition Task. IEEE Access 9: 154396-154412 (2021) - [j17]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Rattikorn Hewett:
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review. Int. J. Hum. Comput. Interact. 37(18): 1709-1719 (2021) - [j16]Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami Namin:
How social engineers use persuasion principles during vishing attacks. Inf. Comput. Secur. 29(2): 314-331 (2021) - [j15]Moitrayee Chatterjee, Akbar Siami Namin:
A fuzzy Dempster-Shafer classifier for detecting Web spams. J. Inf. Secur. Appl. 59: 102793 (2021) - [c69]Eleanor K. Foster, Keith S. Jones, Miriam E. Armstrong, Akbar Siami Namin:
User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design. AHFE (10) 2021: 265-273 - [c68]Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
A Comparison of TCN and LSTM Models in Detecting Anomalies in Time Series Data. IEEE BigData 2021: 2415-2420 - [c67]Zulfiqar Ali Khan, Akbar Siami Namin:
The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey. IEEE BigData 2021: 2421-2426 - [c66]Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin:
Attack Prediction using Hidden Markov Model. COMPSAC 2021: 1695-1702 - [c65]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. COMPSAC 2021: 1703-1710 - [i24]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. CoRR abs/2106.01998 (2021) - [i23]Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin:
Attack Prediction using Hidden Markov Model. CoRR abs/2106.02012 (2021) - [i22]Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models. CoRR abs/2112.09293 (2021) - [i21]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey on the Applications of Blockchains in Security of IoT Systems. CoRR abs/2112.09296 (2021) - 2020
- [j14]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals. ACM Trans. Comput. Educ. 20(4): 29:1-29:25 (2020) - [c64]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. IEEE BigData 2020: 2057-2064 - [c63]Shuvalaxmi Dass, Akbar Siami Namin:
A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations. IEEE BigData 2020: 2065-2072 - [c62]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Predicting Consequences of Cyber-Attacks. IEEE BigData 2020: 2073-2078 - [c61]Luis Felipe Gutiérrez, Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Concern Analysis of Federal Reserve Statements: The Great Recession vs. The COVID-19 Pandemic. IEEE BigData 2020: 2079-2086 - [c60]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Email Embeddings for Phishing Detection. IEEE BigData 2020: 2087-2092 - [c59]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Abuse of the Cloud as an Attack Platform. COMPSAC 2020: 1091-1092 - [c58]Sara Sartoli, Sepideh Ghanavati, Akbar Siami Namin:
Compliance Requirements Checking in Variable Environments. COMPSAC 2020: 1093-1094 - [c57]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Ensemble Learning for Detecting Fake Reviews. COMPSAC 2020: 1320-1325 - [c56]Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin:
Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases. COMPSAC 2020: 1326-1331 - [c55]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud: A Platform to Launch Stealth Attacks. COMPSAC 2020: 1558-1563 - [c54]Shuvalaxmi Dass, Akbar Siami Namin:
Evolutionary Algorithms for Vulnerability Coverage. COMPSAC 2020: 1795-1801 - [c53]Sara Sartoli, Sepideh Ghanavati, Akbar Siami Namin:
Towards Variability-Aware Legal-GRL Framework for Modeling Compliance Requirements. ESPRE@RE 2020: 7-12 - [c52]Varsha Nair, Moitrayee Chatterjee, Neda Tavakoli, Akbar Siami Namin, Craig Snoeyink:
Optimizing CNN using Fast Fourier Transformation for Object Recognition. ICMLA 2020: 234-239 - [c51]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Linguistic Features for Detecting Fake Reviews. ICMLA 2020: 352-359 - [c50]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability coverage for adequacy security testing. SAC 2020: 540-543 - [i20]Neda Tavakoli, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
Clustering Time Series Data through Autoencoder-based Deep Learning Models. CoRR abs/2004.07296 (2020) - [i19]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Launching Stealth Attacks using Cloud. CoRR abs/2006.07908 (2020) - [i18]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Ensemble Learning. CoRR abs/2006.07912 (2020) - [i17]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud as an Attack Platform. CoRR abs/2006.07914 (2020) - [i16]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability Coverage for Secure Configuration. CoRR abs/2006.08604 (2020) - [i15]Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin:
Detection of Coincidentally Correct Test Cases through Random Forests. CoRR abs/2006.08605 (2020) - [i14]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability Coverage as an Adequacy Testing Criterion. CoRR abs/2006.08606 (2020) - [i13]Varsha Nair, Moitrayee Chatterjee, Neda Tavakoli, Akbar Siami Namin, Craig Snoeyink:
Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition. CoRR abs/2010.04257 (2020) - [i12]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Analysis of Linguistic Features. CoRR abs/2010.04260 (2020) - [i11]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Cyber-Attack Consequence Prediction. CoRR abs/2012.00648 (2020) - [i10]Luis Felipe Gutiérrez, Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Concern Analysis of FOMC Statements Comparing The Great Recession and The COVID-19 Pandemic. CoRR abs/2012.02098 (2020) - [i9]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. CoRR abs/2012.02643 (2020) - [i8]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey on Vulnerabilities of Ethereum Smart Contracts. CoRR abs/2012.14481 (2020) - [i7]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Phishing Detection through Email Embeddings. CoRR abs/2012.14488 (2020)
2010 – 2019
- 2019
- [j13]Sara Sartoli, Akbar Siami Namin:
Modeling adaptive access control policies using answer set programming. J. Inf. Secur. Appl. 44: 49-63 (2019) - [j12]Jianjun Zheng, Akbar Siami Namin:
A Survey on the Moving Target Defense Strategies: An Architectural Perspective. J. Comput. Sci. Technol. 34(1): 207-233 (2019) - [c49]Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? IEEE BigData 2019: 3252-3259 - [c48]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
The Performance of LSTM and BiLSTM in Forecasting Time Series. IEEE BigData 2019: 3285-3292 - [c47]Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Phishing Websites through Deep Reinforcement Learning. COMPSAC (2) 2019: 227-232 - [c46]Jianjun Zheng, Akbar Siami Namin:
Enforcing Optimal Moving Target Defense Policies. COMPSAC (1) 2019: 753-759 - [c45]Marcel Heimlich, Akbar Siami Namin:
TestLocal: just-in-time parametrized testing of local variables. SAC 2019: 1874-1877 - [i6]Moitrayee Chatterjee, Akbar Siami Namin:
Deep Reinforcement Learning for Detecting Malicious Websites. CoRR abs/1905.09207 (2019) - [i5]Jianjun Zheng, Akbar Siami Namin:
Markov Decision Process to Enforce Moving Target Defence Policies. CoRR abs/1905.09222 (2019) - [i4]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM. CoRR abs/1911.09512 (2019) - [i3]Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities. CoRR abs/1911.09586 (2019) - 2018
- [j11]Alaa Darabseh, Sima Siami-Namini, Akbar Siami Namin:
Continuous Authentications Using Frequent English Terms. Appl. Artif. Intell. 32(1): 13-47 (2018) - [j10]Xiaozhen Xue, Sima Siami-Namini, Akbar Siami Namin:
Assessing the Effectiveness of Coverage-Based Fault Localizations Using Mutants. Int. J. Softw. Eng. Knowl. Eng. 28(8): 1091-1119 (2018) - [j9]Xiaozhen Xue, Sima Siami-Namini, Akbar Siami Namin:
Testing Multi-Threaded Applications Using Answer Set Programming. Int. J. Softw. Eng. Knowl. Eng. 28(8): 1151-1175 (2018) - [j8]Keith S. Jones, Akbar Siami Namin, Miriam E. Armstrong:
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals. ACM Trans. Comput. Educ. 18(3): 11:1-11:12 (2018) - [c44]Long Hoang Nguyen, Rattikorn Hewett, Akbar Siami Namin, Nicholas Alvarez, Cristina Bradatan, Fang Jin:
Smart and Connected Water Resource Management Via Social Media and Community Engagement. ASONAM 2018: 613-616 - [c43]Moitrayee Chatterjee, Akbar Siami Namin, Prerit Datta:
Evidence Fusion for Malicious Bot Detection in IoT. IEEE BigData 2018: 4545-4548 - [c42]Prerit Datta, Akbar Siami Namin, Moitrayee Chatterjee:
A Survey of Privacy Concerns in Wearable Devices. IEEE BigData 2018: 4549-4553 - [c41]Jianjun Zheng, Akbar Siami Namin:
Defending SDN-based IoT Networks Against DDoS Attacks Using Markov Decision Process. IEEE BigData 2018: 4589-4592 - [c40]Jianjun Zheng, Akbar Siami Namin:
A Markov Decision Process to Determine Optimal Policies in Moving Target. CCS 2018: 2321-2323 - [c39]Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Web Spams Using Evidence Theory. COMPSAC (2) 2018: 695-700 - [c38]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Comparison of ARIMA and LSTM in Forecasting Time Series. ICMLA 2018: 1394-1401 - [c37]Vinh The Nguyen, Akbar Siami Namin, Tommy Dang:
MalViz: an interactive visualization tool for tracing malware. ISSTA 2018: 376-379 - [c36]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only). SIGCSE 2018: 1082 - [i2]Sima Siami-Namini, Akbar Siami Namin:
Forecasting Economics and Financial Time Series: ARIMA vs. LSTM. CoRR abs/1803.06386 (2018) - [i1]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
The Sounds of Cyber Threats. CoRR abs/1805.08272 (2018) - 2017
- [j7]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Fault Localizations Through Feature Selections. Int. J. Softw. Eng. Knowl. Eng. 27(8): 1269-1290 (2017) - [j6]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
A Clustering-Based Test Case Classification Technique for Enhancing Regression Testing. J. Softw. 12(3): 153-164 (2017) - [c35]Sara Sartoli, Akbar Siami Namin:
A semantic model for action-based adaptive security. SAC 2017: 1130-1135 - [c34]Keith S. Jones, Akbar Siami Namin, Miriam Armstrong:
What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only). SIGCSE 2017: 711 - 2016
- [j5]Fethi A. Inan, Akbar Siami Namin, Rona L. Pogrund, Keith S. Jones:
Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. J. Educ. Technol. Soc. 19(1): 28-40 (2016) - [c33]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
Sonifying Internet Security Threats. CHI Extended Abstracts 2016: 2306-2313 - [c32]Sara Sartoli, Akbar Siami Namin:
Adaptive Reasoning for Context-Sensitive Access Controls. COMPSAC 2016: 481-486 - [c31]Sara Sartoli, Akbar Siami Namin:
Adaptive Reasoning in the Presence of Imperfect Security Requirements. COMPSAC 2016: 498-499 - [c30]Jianjun Zheng, Akbar Siami Namin:
The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy. COMPSAC Workshops 2016: 553-558 - [c29]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Early Identification of Vulnerable Software Components via Ensemble Learning. ICMLA 2016: 476-481 - 2015
- [j4]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Debugging in Parallel or Sequential: An Empirical Study. J. Softw. 10(5): 566-576 (2015) - [j3]Akbar Siami Namin, Xiaozhen Xue, Omar Rosas, Pankaj Sharma:
MuRanker: a mutant ranking tool. Softw. Test. Verification Reliab. 25(5-7): 572-604 (2015) - [c28]Alaa Darabseh, Akbar Siami Namin:
On Accuracy of Keystroke Authentications Based on Commonly Used English Words. BIOSIG 2015: 239-246 - [c27]Alaa Darabseh, Akbar Siami Namin:
Keystroke Active Authentications Based on Most Frequently Used Words. IWSPA@CODASPY 2015: 49-54 - [c26]Alaa Darabseh, Akbar Siami Namin:
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication. CW 2015: 321-324 - [c25]Akbar Siami Namin:
Statistical Fault Localization Based on Importance Sampling. ICMLA 2015: 58-63 - [c24]Alaa Darabseh, Akbar Siami Namin:
Effective User Authentications Using Keystroke Dynamics Based on Feature Selections. ICMLA 2015: 307-312 - [c23]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection. ICMLA 2015: 543-548 - [c22]