default search action
Quamar Niyaz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Claire Han, Quamar Niyaz, Ahmad Y. Javaid:
Browser Security Comparison Using Cookie Analysis. EIT 2024: 256-261 - [c25]Mateo Garcia, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid, Sidike Paheding:
An Interactive Visualization Tool for Computer Organization and Design Course. EIT 2024: 457-462 - 2023
- [c24]Sai Suma Sudha, Gabriel Castro Aguayo, Abel A. Reyes Angulo, Jyothirmai Kothakapu, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid:
Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework. EDUCON 2023: 1-10 - [c23]Sai Sushmitha Sudha, Jyothi P. Bandreddi, Laxmi Mounika Podila, Ramesh Govindula, Austin Richardson, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid:
Impact of Smartphone-Based Interactive Learning Modules on Cybersecurity Learning at the High-School Level. EDUCON 2023: 1-10 - [c22]Rayed S. Ahmad, Asmer H. Ali, Syed M. Kazim, Quamar Niyaz:
A GAF and CNN based Wi-Fi Network Intrusion Detection System. INFOCOM Workshops 2023: 1-6 - 2022
- [j8]Yuchen Li, Jered Pawlak, Joshua Price, Khair Al Shamaileh, Quamar Niyaz, Paheding Sidike, Vijay K. Devabhaktuni:
Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-Tailored Machine Learning. IEEE Access 10: 16859-16870 (2022) - [j7]Jeevan S. Devagiri, Paheding Sidike, Quamar Niyaz, Xiaoli Yang, Samantha L. Smith:
Augmented Reality and Artificial Intelligence in industry: Trends, tools, and future challenges. Expert Syst. Appl. 207: 118002 (2022) - [c21]Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:
An Early Detection of Android Malware Using System Calls based Machine Learning Model. ARES 2022: 92:1-92:9 - [c20]Joshua Price, Yuchen Li, Khair Al Shamaileh, Quamar Niyaz, Naima Kaabouch, Vijay K. Devabhaktuni:
Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module. EIT 2022: 1-5 - [c19]Abel A. Reyes Angulo, Xiaoli Yang, Quamar Niyaz, Paheding Sidike, Ahmad Y. Javaid:
A Secure Software Engineering Design Framework for Educational Purpose. EIT 2022: 375-381 - 2021
- [j6]Kyle Greene, Deven Rodgers, Henry Dykhuizen, Quamar Niyaz, Khair Al Shamaileh, Vijay Kumar Devabhaktuni:
A Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR Logic. IEEE Consumer Electron. Mag. 10(1): 101-108 (2021) - [j5]P. C. Srinivasa Rao, A. J. Sravan Kumar, Quamar Niyaz, Paheding Sidike, Vijay K. Devabhaktuni:
Binary chemical reaction optimization based feature selection techniques for machine learning classification problems. Expert Syst. Appl. 167: 114169 (2021) - [j4]Akshay Mathur, Laxmi Mounika Podila, Keyur Kulkarni, Quamar Niyaz, Ahmad Y. Javaid:
NATICUSdroid: A malware detection framework for Android using native and custom permissions. J. Inf. Secur. Appl. 58: 102696 (2021) - [c18]Akshay Mathur, Ethan Ewoldt, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:
Permission-Educator: App for Educating Users About Android Permissions. ICHI 2021: 361-371 - [c17]Jered Pawlak, Yuchen Li, Joshua Price, Matthew Wright, Khair Al Shamaileh, Quamar Niyaz, Vijay K. Devabhaktuni:
A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs. WiseML@WiSec 2021: 1-6 - 2020
- [c16]Xinrun Zhang, Quamar Niyaz, Farha Jahan, Weiqing Sun:
Early Detection of Host-based Intrusions in Linux Environment. EIT 2020: 475-479 - [c15]Kyle Greene, Deven Rodgers, Henry Dykhuizen, Kyle McNeil, Quamar Niyaz, Khair Al Shamaileh:
Timestamp-based Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems. ICCE 2020: 1-4 - [c14]Javier I. Campos, Kristen Johnson, Jonathan Neeley, Staci Roesch, Farha Jahan, Quamar Niyaz, Khair Al Shamaileh:
A Machine Learning Based Smartphone App for GPS Spoofing Detection. SecureComm (2) 2020: 235-241 - [c13]Farha Jahan, Weiqing Sun, Quamar Niyaz:
A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems. SP (Workshops) 2020: 202-207 - [c12]Laxmi Mounika Podila, Jyothi P. Bandreddi, Javier I. Campos, Quamar Niyaz, Xiaoli Yang, Anastasia Trekles, Charlene M. Czerniak, Ahmad Y. Javaid:
Practice-Oriented Smartphone Security Exercises for Developing Cybersecurity Mindset in High School Students. TALE 2020: 303-310
2010 – 2019
- 2019
- [j3]Farha Jahan, Weiqing Sun, Quamar Niyaz, Mansoor Alam:
Security Modeling of Autonomous Systems: A Survey. ACM Comput. Surv. 52(5): 91:1-91:34 (2019) - [c11]Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. UEMCON 2019: 322-328 - [c10]Hafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh:
Identifying Generic Features for Malicious URL Detection System. UEMCON 2019: 347-352 - 2018
- [c9]Wei Liu, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs. EIT 2018: 498-503 - [c8]Francisco D. Vaca, Quamar Niyaz:
An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS). NCA 2018: 1-5 - 2017
- [j2]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). EAI Endorsed Trans. Security Safety 4(12): e2 (2017) - [c7]Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Weiqing Sun:
Normal and anomalous traffic flow pattern analysis for organizational networks. CCECE 2017: 1-4 - 2016
- [j1]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Security Safety 3(9): e2 (2016) - [c6]Ahmad Maroof Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid, Vijay K. Devabhaktuni:
Distributed network traffic feature extraction for a real-time IDS. EIT 2016: 522-526 - [i1]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). CoRR abs/1611.07400 (2016) - 2015
- [c5]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. BICT 2015: 21-26 - [c4]Quamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam:
Light VN: A Light-Weight Testbed for Network and Security Experiments. ITNG 2015: 459-464 - [c3]Quamar Niyaz, Weiqing Sun, Mansoor Alam:
Impact on SDN Powered Network Services Under Adversarial Attacks. SCSE 2015: 228-235 - 2014
- [c2]Junghwan Kim, Quamar Niyaz, Ahmad Y. Javaid:
Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes. BMSB 2014: 1-5 - 2012
- [c1]Arvind Mahla, Deepak Martin, Ishani Ahuja, Quamar Niyaz, Aaditeshwar Seth:
Motivation and design of a content distribution architecture for rural areas. ACM DEV 2012: 6:1-6:10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint