Evolving advanced persistent threat detection using provenance graph and metric learning G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 15 | 2020 |
Knowledge mining in cybersecurity: From attack to defense KA Akbar, SM Halim, Y Hu, A Singhal, L Khan, B Thuraisingham IFIP Annual Conference on Data and Applications Security and Privacy, 110-122, 2022 | 13 | 2022 |
Identifying tactics of advanced persistent threats with limited attack traces KA Akbar, Y Wang, MS Islam, A Singhal, L Khan, B Thuraisingham Information Systems Security: 17th International Conference, ICISS 2021 …, 2021 | 7 | 2021 |
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning KA Akbar, Y Wang, G Ayoade, Y Gao, A Singhal, L Khan, ... IEEE Transactions on Dependable and Secure Computing 20 (5), 3957-3969, 2022 | 5 | 2022 |
The design of an ontology for ATT&CK and its application to cybersecurity KA Akbar, SM Halim, A Singhal, B Abdeen, L Khan, B Thuraisingham Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023 | 3 | 2023 |
Towards privacy-preserving authenticated disease risk queries NJ Mozumder, M Das, T Hashem, S Afrose, KA Akbar Journal of Information Processing 27, 624-642, 2019 | 2 | 2019 |
A novel secret sharing approach for privacy-preserving authenticated disease risk queries in genomic databases M Das, NJ Mozumder, S Afrose, KA Akbar, T Hashem 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 2 | 2018 |
The Design and Application of a Unified Ontology for Cyber Security KA Akbar, FI Rahman, A Singhal, L Khan, B Thuraisingham International Conference on Information Systems Security, 23-41, 2023 | | 2023 |