Select Publications

Journal articles

Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599] (Computers & Security (2022) 115, (S0167404821004223), (10.1016/j.cose.2021.102599))', Computers and Security, 117, http://dx.doi.org/10.1016/j.cose.2022.102689

Abbasi MS; Al-Sahaf H; Mansoori M; Welch I, 2022, 'Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection', Applied Soft Computing, 121, http://dx.doi.org/10.1016/j.asoc.2022.108744

Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Probabilistic modelling of deception-based security framework using markov decision process', Computers and Security, 115, http://dx.doi.org/10.1016/j.cose.2021.102599

Haseeb J; Mansoori M; Hirose Y; Al-Sahaf H; Welch I, 2022, 'Autoencoder-based feature construction for IoT attacks clustering', Future Generation Computer Systems, 127, pp. 487 - 502, http://dx.doi.org/10.1016/j.future.2021.09.025

Mansoori M; Welch I, 2020, 'How do they find us? A study of geolocation tracking techniques of malicious web sites', Computers and Security, 97, http://dx.doi.org/10.1016/j.cose.2020.101948

Mansoori M; Welch I; Choo KKR; Maxion RA; Hashemi SE, 2017, 'Real-world IP and network tracking measurement study of malicious websites with HAZOP', International Journal of Computers and Applications, 39, pp. 106 - 121, http://dx.doi.org/10.1080/1206212X.2017.1283910

Mansoori M; Zakaria O; Gani A, 2012, 'Improving exposure of intrusion deception system through implementation of hybrid honeypot', International Arab Journal of Information Technology, 9

Conference Papers

Haseeb J; Mansoori M; Welch I, 2021, 'Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT', in Proceedings - Conference on Local Computer Networks, LCN, pp. 645 - 648, http://dx.doi.org/10.1109/LCN52139.2021.9525010

Haseeb J; Mansoori M; Welch I, 2020, 'A Measurement Study of IoT-Based Attacks Using IoT Kill Chain', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 557 - 567, http://dx.doi.org/10.1109/TrustCom50675.2020.00080

Haseeb J; Mansoori M; Al-Sahaf H; Welch I, 2020, 'IoT attacks: Features identification and clustering', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 353 - 360, http://dx.doi.org/10.1109/TrustCom50675.2020.00056

Mansoori M; Welch I, 2019, 'Geolocation Tracking and Cloaking of Malicious Web Sites', in Proceedings - Conference on Local Computer Networks, LCN, pp. 274 - 281, http://dx.doi.org/10.1109/LCN44214.2019.8990794

Kumar S; Gao X; Welch I; Mansoori M, 2016, 'A machine learning based web spam filtering approach', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 973 - 980, http://dx.doi.org/10.1109/AINA.2016.177

Mansoori M; Welch I; Choo KKR; Maxion RA, 2016, 'Application of HAZOP to the design of cyber security experiments', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 790 - 799, http://dx.doi.org/10.1109/AINA.2016.115

Mansoori M; Hirose Y; Welch I; Choo KKR, 2016, 'Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 941 - 948, http://dx.doi.org/10.1109/AINA.2016.113

Mansoori M; Welch I; Hashemi SE, 2016, 'Measurement of IP and network tracking behaviour of malicious websites', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2843043.2843358

Mansoori M; Welch I; Fu Q, 2014, 'YALIH, yet another low interaction honeyclient', in Conferences in Research and Practice in Information Technology Series, pp. 7 - 15

Mohammadzadeh H; Mansoori M; Welch I, 2013, 'Evaluation of fingerprinting techniques and a windows-based dynamic honeypot', in Conferences in Research and Practice in Information Technology Series, pp. 59 - 66

Zangooei T; Mansoori M; Welch I, 2012, 'A hybrid recognition and recall based approach in graphical passwords', in Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI 2012, pp. 665 - 673, http://dx.doi.org/10.1145/2414536.2414637

Lashkari AH; Mansoori M; Danesh AS, 2009, 'Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)', in 2009 International Conference on Signal Processing Systems, ICSPS 2009, pp. 445 - 449, http://dx.doi.org/10.1109/ICSPS.2009.87


Back to profile page