What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Latifur Khan
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/icbc2
Blockchain Smart Contract Vulnerability Detection and Segmentation Using ML.
Sabbir Ahmed
Luay Abdeljaber
Sharif Noor Zisad
Mohammad Shahadat Hossain
Latifur Khan
2023
conf/iciss
The Design and Application of a Unified Ontology for Cyber Security.
Khandakar Ashrafi Akbar
Fariha Ishrat Rahman
Anoop Singhal
Latifur Khan
Bhavani Thuraisingham
2021
journals/istr
Crook-sourced intrusion detection as a service.
Frederico Araujo
Gbadebo Ayoade
Khaled Al-Naami
Yang Gao
Kevin W. Hamlen
Latifur Khan
2021
conf/iciss
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Khandakar Ashrafi Akbar
Yigong Wang
Md Shihabul Islam
Anoop Singhal
Latifur Khan
Bhavani Thuraisingham
2021
conf/icbc2
VSCL: Automating Vulnerability Detection in Smart Contracts with Deep Learning.
Feng Mi
Zhuoyi Wang
Chen Zhao
Jinghui Guo
Fawaz Ahmed
Latifur Khan
2021
conf/acsac
SODA: A System for Cyber Deception Orchestration and Automation.
Md Sajidul Islam Sajid
Jinpeng Wei
Basel Abdeen
Ehab Al-Shaer
Md. Mazharul Islam
Walter Diong
Latifur Khan
2020
conf/cns
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Gbadebo Ayoade
Khandakar Ashrafi Akbar
Pracheta Sahoo
Yang Gao
Anmol Agarwal
Kangkook Jee
Latifur Khan
Anoop Singhal
2019
conf/acsac
Improving intrusion detectors by crook-sourcing.
Frederico Araujo
Gbadebo Ayoade
Khaled Al-Naami
Yang Gao
Kevin W. Hamlen
Latifur Khan
2018
conf/ccs
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Vishal Karande
Swarup Chandra
Zhiqiang Lin
Juan Caballero
Latifur Khan
Kevin W. Hamlen
2017
conf/ccs
SGX-Log: Securing System Logs With SGX.
Vishal Karande
Erick Bauman
Zhiqiang Lin
Latifur Khan
2017
conf/ccs
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Fahad Shaon
Murat Kantarcioglu
Zhiqiang Lin
Latifur Khan
2017
conf/esorics
Securing Data Analytics on SGX with Randomization.
Swarup Chandra
Vishal Karande
Zhiqiang Lin
Latifur Khan
Murat Kantarcioglu
Bhavani Thuraisingham
2016
conf/acsac
Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Khaled Al-Naami
Swarup Chandra
Ahmad Mustafa
Latifur Khan
Zhiqiang Lin
Kevin W. Hamlen
Bhavani Thuraisingham
2014
conf/ndss
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
David Sounthiraraj
Justin Sahs
Garret Greenwood
Zhiqiang Lin
Latifur Khan
2008
conf/fc
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
William Yurcik
Clay Woolam
Greg Hellings
Latifur Khan
Bhavani Thuraisingham
2006
conf/ccs
Vulnerability analysis For evaluating quality of protection of security policies.
Muhammad Abedin
Syeda Nessa
Ehab Al-Shaer
Latifur Khan
Coauthors
Ahmad Mustafa
(1)
Anmol Agarwal
(1)
Anoop Singhal
(3)
Basel Abdeen
(1)
Bhavani Thuraisingham
(5)
Chen Zhao
(1)
Clay Woolam
(1)
David Sounthiraraj
(1)
Ehab Al-Shaer
(2)
Erick Bauman
(1)
Fahad Shaon
(1)
Fariha Ishrat Rahman
(1)
Fawaz Ahmed
(1)
Feng Mi
(1)
Frederico Araujo
(2)
Garret Greenwood
(1)
Gbadebo Ayoade
(3)
Greg Hellings
(1)
Jinghui Guo
(1)
Jinpeng Wei
(1)
Juan Caballero
(1)
Justin Sahs
(1)
Kangkook Jee
(1)
Kevin W. Hamlen
(4)
Khaled Al-Naami
(3)
Khandakar Ashrafi Akbar
(3)
Latifur Khan
(16)
Luay Abdeljaber
(1)
Md Sajidul Islam Sajid
(1)
Md Shihabul Islam
(1)
Md. Mazharul Islam
(1)
Mohammad Shahadat Hossain
(1)
Muhammad Abedin
(1)
Murat Kantarcioglu
(2)
Pracheta Sahoo
(1)
Sabbir Ahmed
(1)
Sharif Noor Zisad
(1)
Swarup Chandra
(3)
Syeda Nessa
(1)
Vishal Karande
(3)
Walter Diong
(1)
William Yurcik
(1)
Yang Gao
(3)
Yigong Wang
(1)
Zhiqiang Lin
(6)
Zhuoyi Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to