Follow
A. S. M. Kayes
A. S. M. Kayes
Senior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, Melbourne
Verified email at latrobe.edu.au - Homepage
Title
Cited by
Cited by
Year
Cybersecurity Data Science: An Overview from Machine Learning Perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big Data, Springer 7 (41), 1-29, 2020
5872020
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
IH Sarker, ASM Kayes, P Watters
Journal of Big Data, Springer 6 (57), 1-28, 2019
2572019
A Comparative Analysis of Distributed Ledger Technology Platforms
MJM Chowdhury, MS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
IEEE Access 7, 167930 - 167943, 2019
1982019
IoT-enabled Smart Energy Grid: Applications and Challenges
SMAA Abir, A Anwar, J Choi, ASM Kayes
IEEE Access 9, 50961-50981, 2021
1372021
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges and Future Directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys 54 (9), 1–36, 2022
1152022
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues
ASM Kayes, R Kalaria, IH Sarker, MS Islam, P Watters, A Ng, ...
Sensors 20 (9), 1-34, 2020
822020
Context-Aware Access Control with Imprecise Context Characterization for Cloud-Based Data Resources
ASM Kayes, W Rahayu, T Dillon, E Chang, J Han
Future Generation Computer Systems, Elsevier 93, 237-255, 2019
782019
ABC-RuleMiner: User Behavioral Rule-based Machine Learning Method for Context-Aware Intelligent Services
IH Sarker, ASM Kayes
Journal of Network and Computer Applications, Elsevier 168, 26 pages, 2020
772020
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases
M Hammoudeh, ASM Kayes, P Watters
IEEE Sensors Journal 21 (14), 15753 - 15761, 2020
642020
Achieving Security Scalability and Flexibility using Fog-Based Context-Aware Access Control
ASM Kayes, W Rahayu, P Watters, M Alazab, T Dillon, E Chang
Future Generation Computer Systems, Elsevier 107, 307-323, 2020
582020
A Policy Model and Framework for Context-Aware Access Control to Information Resources
ASM Kayes, J Han, W Rahayu, T Dillon, MS Islam, A Colman
The Computer Journal, Oxford University Press, 2019 62 (5), 670-705, 2019
512019
A Taxonomy of Blockchain Threats and Vulnerabilities
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, P Watters
Blockchain for Cybersecurity and Privacy: Architectures, Challenges and …, 2020
462020
An Ontological Framework for Situation-Aware Access Control of Software Services
ASM Kayes, J Han, A Colman
Information Systems, Elsevier, 253-277, 2015
452015
Detecting Suspicious Texts Using Machine Learning Techniques
O Sharif, MM Hoque, ASM Kayes, R Nowrozy, IH Sarker
Applied Sciences 10 (18), 2020
442020
OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services
ASM Kayes, J Han, A Colman
The Computer Journal, Oxford University Press, 2015 58 (11), 3000–3034, 2015
422015
PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service
S Kudva, R Norderhaug, S Badsha, S Sengupta, ASM Kayes
IEEE International Conference on Informatics, IoT, and Enabling Technologies …, 2020
402020
Critical Situation Management Utilizing IoT-Based Data Resources Through Dynamic Contextual Role Modeling and Activation
ASM Kayes, W Rahayu, T Dillon
Computing, Springer 101 (7), 743–772, 2019
382019
An Ontology-Based Approach to Context-Aware Access Control for Software Services
ASM Kayes, J Han, A Colman
WISE 2013, Springer LNCS, 410-420, 2013
362013
A Secure Mutual Authentication Approach to Fog Computing Environment
R Kalaria, ASM Kayes, W Rahayu, E Pardede
Computers & Security, Elsevier 111, 2021
342021
A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network
AFMS Akhter, M Ahmed, AFMS Shah, A Anwar, ASM Kayes, A Zengin
Sensors 21 (1273), 21 pages, 2021
342021
The system can't perform the operation now. Try again later.
Articles 1–20