default search action
Akbar Siami Namin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Zulfiqar Ali Khan, Akbar Siami Namin:
Involuntary Transfer: A Vulnerability Pattern in Smart Contracts. IEEE Access 12: 62459-62479 (2024) - [j27]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey of Vulnerability Detection Techniques by Smart Contract Tools. IEEE Access 12: 70870-70910 (2024) - [j26]Saroj Gopali, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets. IEEE Access 12: 136451-136465 (2024) - [j25]Saroj Gopali, Sima Siami-Namini, Faranak Abri, Akbar Siami Namin:
A Comparative Multivariate Analysis of VAR and Deep Learning-Based Models for Forecasting Volatile Time Series Data. IEEE Access 12: 155423-155436 (2024) - [c86]Tien Nguyen, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data. COMPSAC 2024: 376-381 - [c85]Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models. COMPSAC 2024: 1739-1746 - [c84]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. SAC 2024: 1064-1066 - [i28]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. CoRR abs/2404.09802 (2024) - [i27]Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models. CoRR abs/2405.19578 (2024) - 2023
- [j24]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin:
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests. Hum. Factors 65(2): 275-287 (2023) - [c83]Zulfiqar Ali Khan, Akbar Siami Namin:
Dynamic Analysis for the Detection of Locked Ether Smart Contracts. IEEE Big Data 2023: 2466-2472 - [c82]Denish Omondi Otieno, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Detecting Phishing URLs using the BERT Transformer Model. IEEE Big Data 2023: 2483-2492 - [c81]Bharkavi Sachithanandam, Akbar Siami Namin, Faranak Abri:
The Performance of Machine and Deep Learning Algorithms in Detecting Fake Reviews. IEEE Big Data 2023: 2499-2507 - [c80]Sonali Singh, Faranak Abri, Akbar Siami Namin:
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles. IEEE Big Data 2023: 2508-2517 - [c79]Zulfiqar Ali Khan, Akbar Siami Namin:
Dynamic Analysis for Detection of Self-Destructive Smart Contracts. COMPSAC 2023: 1093-1100 - [c78]Denish Omondi Otieno, Akbar Siami Namin, Keith S. Jones:
The Application of the BERT Transformer Model for Phishing Email Classification. COMPSAC 2023: 1303-1310 - [c77]Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin:
A Survey on Blockchain-Based Federated Learning and Data Privacy. COMPSAC 2023: 1311-1318 - [i26]Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin:
A Survey on Blockchain-Based Federated Learning and Data Privacy. CoRR abs/2306.17338 (2023) - [i25]Sonali Singh, Faranak Abri, Akbar Siami Namin:
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles. CoRR abs/2311.14876 (2023) - 2022
- [j23]Luis Felipe Gutiérrez, Akbar Siami Namin:
ContextMiner: Mining Contextual Features for Conceptualizing Knowledge in Security Texts. IEEE Access 10: 85891-85904 (2022) - [j22]Huyen N. Nguyen, Faranak Abri, Vung Pham, Moitrayee Chatterjee, Akbar Siami Namin, Tommy Dang:
MalView: Interactive Visual Analytics for Comprehending Malware Behavior. IEEE Access 10: 99909-99930 (2022) - [j21]Faranak Abri, Jianjun Zheng, Akbar Siami Namin, Keith S. Jones:
Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies. IEEE Access 10: 109949-109968 (2022) - [j20]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong:
How do non experts think about cyber attack consequences? Inf. Comput. Secur. 30(4): 473-489 (2022) - [j19]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong:
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. J. Multimodal User Interfaces 16(4): 399-412 (2022) - [c76]Luis Felipe Gutiérrez, Akbar Siami Namin:
Generating Interpretable Features for Context-Aware Document Clustering: A Cybersecurity Case Study. IEEE Big Data 2022: 740-747 - [c75]Ayda Demir, Luis Felipe Gutiérrez, Akbar Siami Namin, Stephen B. Bayne:
Solar Irradiance Prediction Using Transformer-based Machine Learning Models. IEEE Big Data 2022: 2833-2840 - [c74]Bimal Karki, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Using Transformers for Identification of Persuasion Principles in Phishing Emails. IEEE Big Data 2022: 2841-2848 - [c73]Shannon Angel, Akbar Siami Namin:
Conceptual Mappings of Conventional Software and Machine Learning-based Applications Development. COMPSAC 2022: 1223-1230 - [c72]Saroj Gopali, Zulfiqar Ali Khan, Bipin Chhetri, Bimal Karki, Akbar Siami Namin:
Vulnerability Detection in Smart Contracts Using Deep Learning. COMPSAC 2022: 1249-1255 - [c71]Prerit Datta, Akbar Siami Namin, Keith S. Jones:
Can We Predict Consequences of Cyber Attacks? ICMLA 2022: 1047-1054 - [c70]Prerit Datta, Sara Sartoli, Luis Felipe Gutiérrez, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
A user-centric threat model and repository for cyber attacks. SAC 2022: 1341-1346 - 2021
- [j18]Zahra Sadat Shariatmadar, Karim Faez, Akbar Siami Namin:
Sal-HMAX: An Enhanced HMAX Model in Conjunction With a Visual Attention Mechanism to Improve Object Recognition Task. IEEE Access 9: 154396-154412 (2021) - [j17]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Rattikorn Hewett:
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review. Int. J. Hum. Comput. Interact. 37(18): 1709-1719 (2021) - [j16]Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami Namin:
How social engineers use persuasion principles during vishing attacks. Inf. Comput. Secur. 29(2): 314-331 (2021) - [j15]Moitrayee Chatterjee, Akbar Siami Namin:
A fuzzy Dempster-Shafer classifier for detecting Web spams. J. Inf. Secur. Appl. 59: 102793 (2021) - [c69]Eleanor K. Foster, Keith S. Jones, Miriam E. Armstrong, Akbar Siami Namin:
User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design. AHFE (10) 2021: 265-273 - [c68]Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
A Comparison of TCN and LSTM Models in Detecting Anomalies in Time Series Data. IEEE BigData 2021: 2415-2420 - [c67]Zulfiqar Ali Khan, Akbar Siami Namin:
The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey. IEEE BigData 2021: 2421-2426 - [c66]Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin:
Attack Prediction using Hidden Markov Model. COMPSAC 2021: 1695-1702 - [c65]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. COMPSAC 2021: 1703-1710 - [i24]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. CoRR abs/2106.01998 (2021) - [i23]Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin:
Attack Prediction using Hidden Markov Model. CoRR abs/2106.02012 (2021) - [i22]Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin:
A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models. CoRR abs/2112.09293 (2021) - [i21]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey on the Applications of Blockchains in Security of IoT Systems. CoRR abs/2112.09296 (2021) - 2020
- [j14]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals. ACM Trans. Comput. Educ. 20(4): 29:1-29:25 (2020) - [c64]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. IEEE BigData 2020: 2057-2064 - [c63]Shuvalaxmi Dass, Akbar Siami Namin:
A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations. IEEE BigData 2020: 2065-2072 - [c62]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Predicting Consequences of Cyber-Attacks. IEEE BigData 2020: 2073-2078 - [c61]Luis Felipe Gutiérrez, Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Concern Analysis of Federal Reserve Statements: The Great Recession vs. The COVID-19 Pandemic. IEEE BigData 2020: 2079-2086 - [c60]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Email Embeddings for Phishing Detection. IEEE BigData 2020: 2087-2092 - [c59]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Abuse of the Cloud as an Attack Platform. COMPSAC 2020: 1091-1092 - [c58]Sara Sartoli, Sepideh Ghanavati, Akbar Siami Namin:
Compliance Requirements Checking in Variable Environments. COMPSAC 2020: 1093-1094 - [c57]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Ensemble Learning for Detecting Fake Reviews. COMPSAC 2020: 1320-1325 - [c56]Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin:
Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases. COMPSAC 2020: 1326-1331 - [c55]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud: A Platform to Launch Stealth Attacks. COMPSAC 2020: 1558-1563 - [c54]Shuvalaxmi Dass, Akbar Siami Namin:
Evolutionary Algorithms for Vulnerability Coverage. COMPSAC 2020: 1795-1801 - [c53]Sara Sartoli, Sepideh Ghanavati, Akbar Siami Namin:
Towards Variability-Aware Legal-GRL Framework for Modeling Compliance Requirements. ESPRE@RE 2020: 7-12 - [c52]Varsha Nair, Moitrayee Chatterjee, Neda Tavakoli, Akbar Siami Namin, Craig Snoeyink:
Optimizing CNN using Fast Fourier Transformation for Object Recognition. ICMLA 2020: 234-239 - [c51]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Linguistic Features for Detecting Fake Reviews. ICMLA 2020: 352-359 - [c50]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability coverage for adequacy security testing. SAC 2020: 540-543 - [i20]Neda Tavakoli, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
Clustering Time Series Data through Autoencoder-based Deep Learning Models. CoRR abs/2004.07296 (2020) - [i19]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Launching Stealth Attacks using Cloud. CoRR abs/2006.07908 (2020) - [i18]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Ensemble Learning. CoRR abs/2006.07912 (2020) - [i17]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud as an Attack Platform. CoRR abs/2006.07914 (2020) - [i16]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability Coverage for Secure Configuration. CoRR abs/2006.08604 (2020) - [i15]Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin:
Detection of Coincidentally Correct Test Cases through Random Forests. CoRR abs/2006.08605 (2020) - [i14]Shuvalaxmi Dass, Akbar Siami Namin:
Vulnerability Coverage as an Adequacy Testing Criterion. CoRR abs/2006.08606 (2020) - [i13]Varsha Nair, Moitrayee Chatterjee, Neda Tavakoli, Akbar Siami Namin, Craig Snoeyink:
Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition. CoRR abs/2010.04257 (2020) - [i12]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Analysis of Linguistic Features. CoRR abs/2010.04260 (2020) - [i11]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Cyber-Attack Consequence Prediction. CoRR abs/2012.00648 (2020) - [i10]Luis Felipe Gutiérrez, Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Concern Analysis of FOMC Statements Comparing The Great Recession and The COVID-19 Pandemic. CoRR abs/2012.02098 (2020) - [i9]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. CoRR abs/2012.02643 (2020) - [i8]Zulfiqar Ali Khan, Akbar Siami Namin:
A Survey on Vulnerabilities of Ethereum Smart Contracts. CoRR abs/2012.14481 (2020) - [i7]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Phishing Detection through Email Embeddings. CoRR abs/2012.14488 (2020)
2010 – 2019
- 2019
- [j13]Sara Sartoli, Akbar Siami Namin:
Modeling adaptive access control policies using answer set programming. J. Inf. Secur. Appl. 44: 49-63 (2019) - [j12]Jianjun Zheng, Akbar Siami Namin:
A Survey on the Moving Target Defense Strategies: An Architectural Perspective. J. Comput. Sci. Technol. 34(1): 207-233 (2019) - [c49]Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? IEEE BigData 2019: 3252-3259 - [c48]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
The Performance of LSTM and BiLSTM in Forecasting Time Series. IEEE BigData 2019: 3285-3292 - [c47]Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Phishing Websites through Deep Reinforcement Learning. COMPSAC (2) 2019: 227-232 - [c46]Jianjun Zheng, Akbar Siami Namin:
Enforcing Optimal Moving Target Defense Policies. COMPSAC (1) 2019: 753-759 - [c45]Marcel Heimlich, Akbar Siami Namin:
TestLocal: just-in-time parametrized testing of local variables. SAC 2019: 1874-1877 - [i6]Moitrayee Chatterjee, Akbar Siami Namin:
Deep Reinforcement Learning for Detecting Malicious Websites. CoRR abs/1905.09207 (2019) - [i5]Jianjun Zheng, Akbar Siami Namin:
Markov Decision Process to Enforce Moving Target Defence Policies. CoRR abs/1905.09222 (2019) - [i4]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM. CoRR abs/1911.09512 (2019) - [i3]Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin:
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities. CoRR abs/1911.09586 (2019) - 2018
- [j11]Alaa Darabseh, Sima Siami-Namini, Akbar Siami Namin:
Continuous Authentications Using Frequent English Terms. Appl. Artif. Intell. 32(1): 13-47 (2018) - [j10]Xiaozhen Xue, Sima Siami-Namini, Akbar Siami Namin:
Assessing the Effectiveness of Coverage-Based Fault Localizations Using Mutants. Int. J. Softw. Eng. Knowl. Eng. 28(8): 1091-1119 (2018) - [j9]Xiaozhen Xue, Sima Siami-Namini, Akbar Siami Namin:
Testing Multi-Threaded Applications Using Answer Set Programming. Int. J. Softw. Eng. Knowl. Eng. 28(8): 1151-1175 (2018) - [j8]Keith S. Jones, Akbar Siami Namin, Miriam E. Armstrong:
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals. ACM Trans. Comput. Educ. 18(3): 11:1-11:12 (2018) - [c44]Long Hoang Nguyen, Rattikorn Hewett, Akbar Siami Namin, Nicholas Alvarez, Cristina Bradatan, Fang Jin:
Smart and Connected Water Resource Management Via Social Media and Community Engagement. ASONAM 2018: 613-616 - [c43]Moitrayee Chatterjee, Akbar Siami Namin, Prerit Datta:
Evidence Fusion for Malicious Bot Detection in IoT. IEEE BigData 2018: 4545-4548 - [c42]Prerit Datta, Akbar Siami Namin, Moitrayee Chatterjee:
A Survey of Privacy Concerns in Wearable Devices. IEEE BigData 2018: 4549-4553 - [c41]Jianjun Zheng, Akbar Siami Namin:
Defending SDN-based IoT Networks Against DDoS Attacks Using Markov Decision Process. IEEE BigData 2018: 4589-4592 - [c40]Jianjun Zheng, Akbar Siami Namin:
A Markov Decision Process to Determine Optimal Policies in Moving Target. CCS 2018: 2321-2323 - [c39]Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Web Spams Using Evidence Theory. COMPSAC (2) 2018: 695-700 - [c38]Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin:
A Comparison of ARIMA and LSTM in Forecasting Time Series. ICMLA 2018: 1394-1401 - [c37]Vinh The Nguyen, Akbar Siami Namin, Tommy Dang:
MalViz: an interactive visualization tool for tracing malware. ISSTA 2018: 376-379 - [c36]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only). SIGCSE 2018: 1082 - [i2]Sima Siami-Namini, Akbar Siami Namin:
Forecasting Economics and Financial Time Series: ARIMA vs. LSTM. CoRR abs/1803.06386 (2018) - [i1]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
The Sounds of Cyber Threats. CoRR abs/1805.08272 (2018) - 2017
- [j7]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Fault Localizations Through Feature Selections. Int. J. Softw. Eng. Knowl. Eng. 27(8): 1269-1290 (2017) - [j6]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
A Clustering-Based Test Case Classification Technique for Enhancing Regression Testing. J. Softw. 12(3): 153-164 (2017) - [c35]Sara Sartoli, Akbar Siami Namin:
A semantic model for action-based adaptive security. SAC 2017: 1130-1135 - [c34]Keith S. Jones, Akbar Siami Namin, Miriam Armstrong:
What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only). SIGCSE 2017: 711 - 2016
- [j5]Fethi A. Inan, Akbar Siami Namin, Rona L. Pogrund, Keith S. Jones:
Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. J. Educ. Technol. Soc. 19(1): 28-40 (2016) - [c33]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
Sonifying Internet Security Threats. CHI Extended Abstracts 2016: 2306-2313 - [c32]Sara Sartoli, Akbar Siami Namin:
Adaptive Reasoning for Context-Sensitive Access Controls. COMPSAC 2016: 481-486 - [c31]Sara Sartoli, Akbar Siami Namin:
Adaptive Reasoning in the Presence of Imperfect Security Requirements. COMPSAC 2016: 498-499 - [c30]Jianjun Zheng, Akbar Siami Namin:
The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy. COMPSAC Workshops 2016: 553-558 - [c29]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Early Identification of Vulnerable Software Components via Ensemble Learning. ICMLA 2016: 476-481 - 2015
- [j4]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Debugging in Parallel or Sequential: An Empirical Study. J. Softw. 10(5): 566-576 (2015) - [j3]Akbar Siami Namin, Xiaozhen Xue, Omar Rosas, Pankaj Sharma:
MuRanker: a mutant ranking tool. Softw. Test. Verification Reliab. 25(5-7): 572-604 (2015) - [c28]Alaa Darabseh, Akbar Siami Namin:
On Accuracy of Keystroke Authentications Based on Commonly Used English Words. BIOSIG 2015: 239-246 - [c27]Alaa Darabseh, Akbar Siami Namin:
Keystroke Active Authentications Based on Most Frequently Used Words. IWSPA@CODASPY 2015: 49-54 - [c26]Alaa Darabseh, Akbar Siami Namin:
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication. CW 2015: 321-324 - [c25]Akbar Siami Namin:
Statistical Fault Localization Based on Importance Sampling. ICMLA 2015: 58-63 - [c24]Alaa Darabseh, Akbar Siami Namin:
Effective User Authentications Using Keystroke Dynamics Based on Feature Selections. ICMLA 2015: 307-312 - [c23]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection. ICMLA 2015: 543-548 - [c22]Sara Sartoli, Akbar Siami Namin:
Poster: Reasoning Based on Imperfect Context Data in Adaptive Security. ICSE (2) 2015: 835-836 - 2014
- [c21]Xiaozhen Xue, Yulei Pang, Akbar Siami Namin:
Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations. COMPSAC 2014: 239-244 - [c20]Alaa Darabseh, Akbar Siami Namin:
The accuracy of user authentication through keystroke features using the most frequent words. CISR 2014: 85-88 - [c19]Xiaozhen Xue, Yulei Pang, Akbar Siami Namin:
Feature Selections for Effectively Localizing Faulty Events in GUI Applications. ICMLA 2014: 306-311 - 2013
- [c18]Xiaozhen Xue, Akbar Siami Namin:
Measuring the Odds of Statements Being Faulty. Ada-Europe 2013: 109-126 - [c17]Xiaozhen Xue, Akbar Siami Namin:
How Significant is the Effect of Fault Interactions on Coverage-Based Fault Localizations? ESEM 2013: 113-122 - [c16]Yulei Pang, Xiaozhen Xue, Akbar Siami Namin:
Identifying Effective Test Cases through K-Means Clustering for Enhancing Regression Testing. ICMLA (2) 2013: 78-83 - 2012
- [c15]Delbert Bonner, Akbar Siami Namin:
An Energy Model for Applications Running on Multicore Systems. CGC 2012: 1-8 - 2011
- [c14]Pratyusha Madiraju, Akbar Siami Namin:
Paraµ - A Partial and Higher-Order Mutation Tool with Concurrency Operators. ICST Workshops 2011: 351-356 - [c13]Sahitya Kakarla, Selina Momotaz, Akbar Siami Namin:
An Evaluation of Mutation and Data-Flow Testing: A Meta-analysis. ICST Workshops 2011: 366-375 - [c12]Akbar Siami Namin, Sahitya Kakarla:
The use of mutation in testing experiments and its sensitivity to external threats. ISSTA 2011: 342-352 - 2010
- [c11]Sahitya Kakarla, Akbar Siami Namin:
The influence of environmental parameters on concurrency fault exposures: an exploratory study. ESEM 2010 - [c10]Akbar Siami Namin, Mohan Sridharan, Pulkit Tomar:
Predicting multi-core performance: a case study using Solaris containers. IWMSE@ICSE 2010: 18-25 - [c9]Mohan Sridharan, Akbar Siami Namin:
Bayesian methods for data analysis in software engineering. ICSE (2) 2010: 477-478 - [c8]Mohan Sridharan, Akbar Siami Namin:
Prioritizing Mutation Operators Based on Importance Sampling. ISSRE 2010: 378-387 - [c7]Akbar Siami Namin, Mohan Sridharan:
Bayesian reasoning for software testing. FoSER 2010: 349-354
2000 – 2009
- 2009
- [c6]Akbar Siami Namin, James H. Andrews:
The influence of size and coverage on test suite effectiveness. ISSTA 2009: 57-68 - 2008
- [c5]Akbar Siami Namin, James H. Andrews, Duncan J. Murdoch:
Sufficient mutation operators for measuring test effectiveness. ICSE 2008: 351-360 - 2007
- [c4]Akbar Siami Namin, James H. Andrews:
On Sufficiency of Mutants. ICSE Companion 2007: 73-74 - 2006
- [j2]Akbar Siami Namin, Weiming Shen, Hamada H. Ghenniwa:
Implementing enterprise collaboration using web services and software agents. Int. J. Netw. Virtual Organisations 3(2): 185-201 (2006) - [j1]James H. Andrews, Lionel C. Briand, Yvan Labiche, Akbar Siami Namin:
Using Mutation Analysis for Assessing and Comparing Testing Coverage Criteria. IEEE Trans. Software Eng. 32(8): 608-624 (2006) - [c3]Akbar Siami Namin, Ruizhong Wei, Weiming Shen, Hamada H. Ghenniwa:
An Efficient Trust Model for Multi-Agent Systems. CSCWD 2006: 659-664 - 2005
- [c2]Akbar Siami Namin, Ruizhong Wei, Weiming Shen, Hamada H. Ghenniwa:
Applying secret sharing schemes to service reputation. CSCWD (2) 2005: 696-703 - 2004
- [c1]Akbar Siami Namin, Weiming Shen, Hamada H. Ghenniwa:
Web Services/Agent-Based Model for Inter-Enterprise Collaboration. BASYS 2004: 231-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint