Follow
Muhammad Lutfor Rahman
Title
Cited by
Cited by
Year
A multi-modal neuro-physiological study of phishing detection and malware warnings
A Neupane, ML Rahman, N Saxena, L Hirshfield
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
642015
Peep: Passively eavesdropping private input via brainwave signals
A Neupane, ML Rahman, N Saxena
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
152017
Users really do respond to smishing
ML Rahman, D Timko, H Wali, A Neupane
The 13th ACM Conference on Data and Application Security and Privacy, https …, 2023
92023
SynFuzz: Efficient concolic execution via branch condition synthesis
W Han, ML Rahman, Y Chen, C Song, B Lee, I Shin
arXiv preprint arXiv:1905.09532, 2019
62019
Learning tensor-based representations from brain-computer interface data for cybersecurity
ML Rahman, S Bardhan, A Neupane, E Papalexakis, C Song
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019
62019
Accountable proof of ownership for data using timing element in cloud services
M Mizan, ML Rahman, R Khan, M Haque, R Hasan
High Performance Computing and Simulation (HPCS), 2013 International …, 2013
62013
Commercial anti-smishing tools and their comparative effectiveness against modern threats
D Timko, ML Rahman
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
52023
Iac: On the feasibility of utilizing neural signals for access control
ML Rahman, A Neupane, C Song
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
42018
Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition Technology
AM Alqarni, D Timko, ML Rahman
The 20th Annual International Conference on Privacy, Security and Trust (PST …, 2023
12023
Combining Neural and Behavioral Measures Enhances Adaptive Training
ML Rahman, BT Files, AH Oiknine, KA Pollard, P Khooshabeh, C Song, ...
Frontiers in Human Neuroscience 16, 787576, 2022
12022
Smishing Dataset I: Phishing SMS Dataset from Smishtank. com
D Timko, ML Rahman
arXiv preprint arXiv:2402.18430, 2024
2024
Unveiling Human Factors and Message Attributes in a Smishing Study
D Timko, DH Castillo, ML Rahman
arXiv preprint arXiv:2311.06911, 2024
2024
Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners
T Mazumdar, D Timko, ML Rahman
The 22nd International Conference on Cryptology and Network Security (CANS …, 2023
2023
Towards Improving Cybersecurity and Augmenting Human Training Performance Using Brain Imaging Techniques
ML Rahman
University of California, Riverside, 2020
2020
Black-Box Attribute Inference Protection With Adversarial Reprogramming.............. 1 Hossein Abedi Khorasgani, Yang Wang and Noman Mohammed A Rule-Language Tailored for …
A Alqarni, D Timko, ML Rahman, NB Akhuseyinoglu, U Anjum, RB Salem, ...
Understanding Phishing Attacks through the Lens of BCI
ML Rahman
The system can't perform the operation now. Try again later.
Articles 1–16