Research methods for cyber security TW Edgar, DO Manz Syngress, 2017 | 419 | 2017 |
Automation of irrigation system using ANN based controller SM Umair, R Usman International Journal of Electrical & Computer Sciences IJECS-IJENS 10 (02 …, 2010 | 116 | 2010 |
A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions U Rauf Arabian Journal for Science and Engineering 43 (12), 6693-6708, 2018 | 52 | 2018 |
Formal approach for resilient reachability based on end-system route agility U Rauf, F Gillani, E Al-Shaer, M Halappanavar, S Chatterjee, C Oehmen Proceedings of the 2016 ACM Workshop on Moving Target Defense, 117-127, 2016 | 20 | 2016 |
Cyber resilience-by-construction: Modeling, measuring & verifying YI Khan, E Al-Shaer, U Rauf Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015 | 17 | 2015 |
A taxonomic classification of insider threats: Existing techniques, future directions & recommendations U Rauf, F Mohsen, Z Wei Journal of Cyber Security and Mobility 12 (2), 221-252, 2023 | 13 | 2023 |
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework U Rauf, M Shehab, N Qamar, S Sameen Future Generation Computer Systems 117, 412-425, 2021 | 12 | 2021 |
Structural identification using a nonlinear constraint satisfaction processor with interval arithmetic and contractor programming T Kernicky, M Whelan, U Rauf, E Al-Shaer Computers & Structures 188, 1-16, 2017 | 10 | 2017 |
A survey on COVID-19 data analysis using AI, IoT, and social media MJ Butt, AK Malik, N Qamar, S Yar, AJ Malik, U Rauf Sensors 23 (12), 5543, 2023 | 9 | 2023 |
Design and analysis of a truncated elliptical-shaped chipless RFID tag AT Khan, Y Abdullah, S Farhat, W Nawaz, U Rauf Turkish Journal of Electrical Engineering and Computer Sciences 29 (7), 2950 …, 2021 | 8 | 2021 |
Formal modeling and analysis of biological regulatory networks using spin U Rauf, U Siddique, J Ahmad, U Niazi 2011 IEEE International Conference on Bioinformatics and Biomedicine, 304-308, 2011 | 7 | 2011 |
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms F Naeem, M Mohsin, U Rauf, LA Khan Future Generation Computer Systems 115, 374-386, 2021 | 6 | 2021 |
Bio-inspired approach to thwart against insider threats: An access control policy regulation framework U Rauf, M Shehab, N Qamar, S Sameen Bio-inspired Information and Communication Technologies: 11th EAI …, 2019 | 5 | 2019 |
Bio-inspired cyber security and threat analytics U Rauf PhD thesis, The University of North Carolina at Charlotte, 2020 | 3 | 2020 |
Attack trees for protecting biometric systems against evolving presentation attacks E Marasco, B Cukic, M Shehab, R Usman 16th Annual IEEE International Conference on Technologies for Homeland …, 2017 | 3 | 2017 |
E-Watcher: insider threat monitoring and detection for enhanced security URZWF Mohsen Annals of Telecommunications, 2024 | 2 | 2024 |
Employee Watcher: A Machine Learning-Based Hybrid Insider Threat Detection Framework FM Usman Rauf, Zhiyuan Wei 7th Cyber Security in Networking Conference (CSNet) 2023, 2023 | 2 | 2023 |
Cyber regulatory networks: Towards a bio-inspired auto-resilient framework for cyber-defense U Rauf, M Mohsin, W Mazurczyk Bio-inspired Information and Communication Technologies: 11th EAI …, 2019 | 2 | 2019 |
Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach U Rauf, S Sameen, A Cerone Electronic Notes in Theoretical Computer Science 299, 85-100, 2013 | 2 | 2013 |
Securing GSM voice through scrambling IA Naeem, U Rauf, SF Ahmad 2010 IEEE Region 8 International Conference on Computational Technologies in …, 2010 | 2 | 2010 |