关注
Mohiuddin Ahmed
Mohiuddin Ahmed
在 uncc.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd annual computer security applications conference …, 2017
2632017
gextractor: Towards automated extraction of malware deception parameters
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
132018
Statistical learning of apt ttp chains from mitre att&ck
R Al-Shaer, M Ahmed, E Al-Shaer
Proc. RSA Conf, 1-2, 2018
82018
A poisoning attack against cryptocurrency mining pools
M Ahmed, J Wei, Y Wang, E Al-Shaer
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018
72018
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense
M Ahmed, E Al-Shaer
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
62019
SCAHunter: Scalable Threat Hunting Through Decentralized Hierarchical Monitoring Agent Architecture
M Ahmed, J Wei, E Al-Shaer
Science and Information Conference, 1282-1307, 2023
22023
Ushoshi2023 at BLP-2023 Task 2: A Comparison of Traditional to Advanced Linguistic Models to Analyze Sentiment in Bangla Texts
S Khushbu, N Nur, M Ahmed, N Nur
Proceedings of the First Workshop on Bangla Language Processing (BLP-2023 …, 2023
12023
Prompting LLM to Enforce and Validate CIS Critical Security Control
M Ahmed, J Wei, E Al-Shaer
Proceedings of the 29th ACM Symposium on Access Control Models and …, 2024
2024
Distributed hierarchical event monitoring for security analytics
M Ahmed
University of North Carolina at Charlotte, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–9