A block based data hiding method in images using pixel value differencing and LSB substitution method T Mahjabin, SM Hossain, MS Haque 2012 15th International Conference on Computer and Information Technology …, 2012 | 34 | 2012 |
Causes, impacts, and detection approaches of code smell: a survey MS Haque, J Carver, T Atkison Proceedings of the ACMSE 2018 Conference, 1-8, 2018 | 29 | 2018 |
An evolutionary approach of attack graphs and attack trees: A survey of attack modeling S Haque, M Keffeler, T Atkison Proceedings of the International Conference on Security and Management (SAM …, 2017 | 23 | 2017 |
Testing vulnerabilities in bluetooth low energy T Willingham, C Henderson, B Kiel, MS Haque, T Atkison Proceedings of the ACMSE 2018 Conference, 1-7, 2018 | 14 | 2018 |
A forensic enabled data provenance model for public cloud S Haque, T Atkison Journal of Digital Forensics, Security and Law 13 (3), 7, 2018 | 11 | 2018 |
An evolutionary approach of attack graph to attack tree conversion MS Haque, T Atkison International Journal of Computer Network and Information Security 11 (11), 1, 2017 | 11 | 2017 |
Blocking artifact detection by analyzing the distortions of local properties in images MM Hasan, K Ahn, MS Haque, O Chae 14th International Conference on Computer and Information Technology (ICCIT …, 2011 | 3 | 2011 |