Skip to main content

Showing 1–5 of 5 results for author: Mohammed, Z

.
  1. A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds

    Authors: Jamal H. Al-Yasiri, Mohamad Fadli Bin Zolkipli, Nik Fatinah N Mohd Farid, Mohammed Alsamman, Zainab Ali Mohammed

    Abstract: In response to the escalating cyber threats, the efficiency of Cyber Threat Intelligence (CTI) data collection has become paramount in ensuring robust cybersecurity. However, existing works encounter significant challenges in preprocessing large volumes of multilingual threat data, leading to inefficiencies in real-time threat analysis. This paper presents a systematic review of current techniques… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: IEEE conference paper

    Journal ref: 2024 7th International Conference on Internet Applications, Protocols, and Services (NETAPPS), Kuala Lumpur: IEEE, 11,2024

  2. arXiv:2503.05516  [pdf

    cs.CY cs.AI cs.CL cs.HC

    Cognitive Bias Detection Using Advanced Prompt Engineering

    Authors: Frederic Lemieux, Aisha Behr, Clara Kellermann-Bryant, Zaki Mohammed

    Abstract: Cognitive biases, systematic deviations from rationality in judgment, pose significant challenges in generating objective content. This paper introduces a novel approach for real-time cognitive bias detection in user-generated text using large language models (LLMs) and advanced prompt engineering techniques. The proposed system analyzes textual data to identify common cognitive biases such as con… ▽ More

    Submitted 7 March, 2025; originally announced March 2025.

    Comments: 17 pages. 6 Figures, 2 Tables

  3. arXiv:2007.08688  [pdf, ps, other

    cs.CR

    Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey

    Authors: Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore

    Abstract: Diversity-based security approaches have been studied for several decades since the 1970's. The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems. In this work, we are particularly interested in providing an in-depth, comprehensive survey of existing diversity-based approaches,… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  4. arXiv:2005.08787  [pdf, other

    eess.SP eess.SY

    Spotr: GPS Spoofing Detection via Device Fingerprinting

    Authors: Mahsa Foruhandeh, Abdullah Z. Mohammed, Gregor Kildow, Paul Berges, Ryan Gerdes

    Abstract: As the worlds predominant navigation system GPS is critical to modern life, finding applications in diverse areas like information security, healthcare, marketing, and power and water grid management. Unfortunately this diversification has only served to underscore the insecurity of GPS and the critical need to harden this system against manipulation and exploitation. A wide variety of attacks aga… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

  5. arXiv:1707.08206  [pdf, other

    cs.IT

    On Generalized Optimal Hard Decision Fusion

    Authors: Fayazur Rahaman Mohammad, Zafar Ali Khan Mohammed

    Abstract: In this letter, we formulate a generalized decision fusion problem (GDFP) for sensing with centralized hard decision fusion. We show that various new and existing decision fusion rules are special cases of the proposed GDFP. We then relate our problem to the classical $0-1$ Knapsack problem (KP). Consequently, we apply dynamic programming to solve the exponentially complex GDFP in polynomial time.… ▽ More

    Submitted 21 June, 2017; originally announced July 2017.

    Comments: Submitted to IEEE Signal Processing Letters on 05 March 2017 for peer-review