Blockchain-based automated and robust cyber security management S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ... Journal of Parallel and Distributed Computing 163, 62-82, 2022 | 21 | 2022 |
Characterizing the landscape of covid-19 themed cyberattacks and defenses MMA Pritom, KM Schweitzer, RM Bateman, M Xu, S Xu 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 19 | 2020 |
A multiconstrained QoS aware MAC protocol for cluster-based cognitive radio sensor networks MMA Pritom, S Sarker, MA Razzaque, MM Hassan, MA Hossain, ... International Journal of Distributed Sensor Networks 11 (5), 262871, 2015 | 17 | 2015 |
The design of cyber threat hunting games: A case study MNS Miazi, MMA Pritom, M Shehab, B Chu, J Wei 2017 26th International Conference on Computer Communication and Networks …, 2017 | 16 | 2017 |
Predicting zero-day malicious ip addresses A Niakanlahiji, MM Pritom, BT Chu, E Al-Shaer Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017 | 14 | 2017 |
Data-driven characterization and detection of covid-19 themed malicious websites MMA Pritom, KM Schweitzer, RM Bateman, M Xu, S Xu 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 12 | 2020 |
A study on log analysis approaches using sandia dataset MMA Pritom, C Li, B Chu, X Niu 2017 26th International Conference on Computer Communication and Networks …, 2017 | 7 | 2017 |
Method and system for blockchain-based cyber security management S Xu, HE Songlin, E Ficke, MMA Pritom, C Huashan, Q Tang, Q Chen, ... US Patent App. 17/733,580, 2023 | 1 | 2023 |
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study MMA Pritom, S Xu 2022 IEEE Conference on Communications and Network Security (CNS), 2022 | 1 | 2022 |
Poster: Use of LLM-based Generative AI Chatbots for Smishing Attacks and Defenses AM Shibli, MMA Pritom 45th IEEE Symposium on Security and Privacy, 1-2, 2024 | | 2024 |
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns AM Shibli, MMA Pritom, M Gupta 2024 12th International Symposium on Digital Forensics and Security (ISDFS …, 2024 | | 2024 |
MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain T Islam, FH Bappy, TS Zaman, MSI Sajid, MMA Pritom 2024 IEEE 14th Annual Computing and Communication Workshop and Conference …, 2024 | | 2024 |
ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain FH Bappy, T Islam, TS Zaman, MSI Sajid, MMA Pritom 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 1054-1055, 2024 | | 2024 |
Defending against Malicious Websites: Themed Threats, Detection, and Law-Enforcement MMA Pritom The University of Texas at San Antonio, 2022 | | 2022 |