Usman Rauf

ORCID: 0000-0003-3667-4974
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Structural Health Monitoring Techniques
  • Gene Regulatory Network Analysis
  • Anomaly Detection Techniques and Applications
  • Probabilistic and Robust Engineering Design
  • Microbial Metabolic Engineering and Bioproduction
  • Formal Methods in Verification
  • Cell Image Analysis Techniques
  • Adversarial Robustness in Machine Learning
  • Privacy-Preserving Technologies in Data
  • Software-Defined Networks and 5G
  • Artificial Immune Systems Applications
  • Molecular Communication and Nanonetworks
  • Software Testing and Debugging Techniques
  • Dam Engineering and Safety
  • Software System Performance and Reliability
  • Smart Grid Security and Resilience
  • Remote-Sensing Image Classification
  • Control Systems and Identification
  • Cybercrime and Law Enforcement Studies
  • UAV Applications and Optimization
  • Misinformation and Its Impacts
  • Spectroscopy and Chemometric Analyses

Mercy University
2020-2024

National University of Sciences and Technology
2022

University of North Carolina at Charlotte
2015-2020

National University of Science and Technology
2010-2011

In the last two decades, number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms architectures to neutralize modern threats in a real-time situation. Disgruntled rouge employees/agents intrusive applications are notorious classes such threats, referred as Insider Threats, which lead breaches. To counter state-of-the-art require incorporation active threat analytics proactively...

10.13052/jcsm2245-1439.1225 article EN Journal of Cyber Security and Mobility 2023-05-03

Abstract Insider threats refer to harmful actions carried out by authorized users within an organization, posing the most damaging risks. The increasing number of these has revealed inadequacy traditional methods for detecting and mitigating insider threats. These existing approaches lack ability analyze activity-related information in detail, resulting delayed detection malicious intent. Additionally, current advancements addressing noisy datasets or unknown scenarios, leading under-fitting...

10.1007/s12243-024-01023-7 article EN cc-by Annals of Telecommunications 2024-04-04

10.1007/s13369-018-3117-2 article EN Arabian Journal for Science and Engineering 2018-02-28

Android is widely recognized as one of the leading mobile operating systems globally. As popularity and usage OS third-party application stores continue to soar, process developing publishing applications has become increasingly accessible. However, absence a robust filtering mechanism ensure that only request appropriate secure permissions poses significant concern. While extensive research been conducted on malware analysis, realm intrusive remains largely unexplored. The lack defensive...

10.1109/access.2024.3373202 article EN cc-by-nc-nd IEEE Access 2024-01-01

The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers DDoS attackers) plenty time to study the identify vulnerable (critical) links plan devastating stealthy attacks. Recently, Moving Target Defense (MTD) based approaches have been proposed defend against DoS However, MTD for route mutation are oriented towards re-configuring parameters in Local Area...

10.1145/2995272.2995275 article EN 2016-10-24

The need of cyber security is increasing as attacks are escalating day by day. Cyber now so many and sophisticated that will unavoidably get through. Therefore, there an immense to employ resilient architectures defend known or unknown threats. Engineer- ing system/infrastructure a challenging task, implies how measure the resilience obtain sufficient necessary maintain its service delivery under diverse situations. This paper has two fold objective, first propose formal approach from...

10.1145/2809826.2809836 article EN 2015-10-06

Insider threats refer to harmful actions carried out by authorized users within an organization, posing the most damaging risks. The increasing number of these has revealed inadequacy traditional methods for detecting and mitigating insider threats. These existing approaches lack ability analyze activity-related information in detail, resulting delayed detection malicious intent. To address this, our paper presents a hybrid threat framework. We enhance prediction accuracy incorporating layer...

10.1109/csnet59123.2023.10339777 article EN 2023-10-16

In the last two decades, formal verification has emerged as an important technique for modeling and analysis of real time reactive unpredictable systems. The main advantage model checking over simulation based is its inherent soundness reliability computed results. this paper, we propose to use explicit state checker (SPIN) Linear Temporal Logic (LTL) exploration complex dynamics (cycles) biological regulatory networks (BRNs). contribution paper also includes generalized framework BRNs on...

10.1109/bibm.2011.124 article EN 2011-11-01

In the realm of system biology, study regulatory networks leads biologists to development increasingly large, detailed and complex models. These models, replicating dynamics cell processes, are then analyzed using different approaches obtain predictions. Genetic oscillations play a main role in activity signal transduction by maintaining cascade internal biochemical reactions with extracellular environment. Molecular alterations performance such behavioral rhythms can lead severe...

10.1016/j.entcs.2013.11.008 article EN Electronic Notes in Theoretical Computer Science 2013-12-01

GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however for air interface only means that it secures channel till BTS. This has been cracked other vulnerabilities like replay man in middle attacks have put all personal confidential communications at stake. A lot of work done on voice over GSM's Circuit Switched Data (CSD) channel. But CSD impairments quality issues prohibitive realization a reliable...

10.1109/sibircon.2010.5555330 article EN 2010-07-01

Physics-based approaches to vibration-based structural health monitoring largely rely on identification, or model updating, of a finite element through correlation with the experimentally measured natural frequencies and mode shapes. Currently, predominant technique used perform updating relies local optimization strategies, such as gradient-based methods, global techniques, genetic algorithms. However, optimization-based provide limited capabilities for addressing fundamental issues related...

10.12783/shm2015/175 article EN Structural Health Monitoring 2015-01-01
Coming Soon ...