Florida International University
Edit Your Profile
FIU Discovery
Toggle navigation
Browse
Home
People
Organizations
Scholarly & Creative Works
Research Facilities
Support
Edit Your Profile
Acar, Abbas
Positions
Postdoctoral Associate
,
Knight Foundation School of Computing and Information Sciences
,
College of Engineering and Computing
Share this page
Twitter
Email
Copy link
Share
Scholarly & Creative Works
Scholarly & Creative Works
Patents issued
A Method for Continuous User Authentication with Wearables
Patent
selected scholarly works & creative activities
Article
2024
A comprehensive security and performance assessment of UAV authentication schemes
Full Text via DOI:
10.1002/spy2.338
Web of Science:
001041984800001
2024
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
Full Text via DOI:
10.1109/MSEC.2023.3332004
Web of Science:
001121233400001
2023
Research article Energy consumption of on-device machine learning models for IoT intrusion detection
Full Text via DOI:
10.1016/j.iot.2022.100670
Web of Science:
000997502100001
2021
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
Full Text via DOI:
10.1145/3464690
Web of Science:
000704136900002
2021
A Usable and Robust Continuous Authentication Framework Using Wearables
.
IEEE TRANSACTIONS ON MOBILE COMPUTING
. 20:2140-2153.
Full Text via DOI:
10.1109/TMC.2020.2974941
Web of Science:
000647326900003
2019
A privacy-preserving multifactor authentication system
Full Text via DOI:
10.1002/spy2.88
Web of Science:
000754966900004
2018
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
.
ACM COMPUTING SURVEYS
. 51.
Full Text via DOI:
10.1145/3214303
Web of Science:
000444694000014
Conference
2024
50 Shades of Support: A Device-Centric Analysis of Android Security Updates
Full Text via DOI:
10.14722/ndss.2024.24175
2023
Forensic Analysis of Cryptojacking in Host-based Docker Containers Using Honeypots
. 4860-4865.
Full Text via DOI:
10.1109/ICC45041.2023.10278764
Web of Science:
001094862604159
2023
RøB: Ransomware over Modern Web Browsers
. 7073-7090.
2022
A First Look at Code Obfuscation forWebAssembly
. 140-145.
Full Text via DOI:
10.1145/3507657.3528560
Web of Science:
000927874700017
2022
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
Full Text via DOI:
10.14722/ndss.2022.24208
2022
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments
Full Text via DOI:
10.14722/ndss.2022.24133
2021
In-Browser Cryptomining for Good: An Untold Story
Full Text via DOI:
10.1109/DAPPS52256.2021.00008
Web of Science:
000852716800003
2021
SoK: Cryptojacking Malware
. 120-139.
Full Text via DOI:
10.1109/EuroSP51992.2021.00019
Web of Science:
000783804100008
2020
Kratos: Multi-user multi-device-aware access control system for the smart home
. 111-121.
Full Text via DOI:
10.1145/3395351.3399358
2020
Peek-a-boo: I see your smart home activities, even encrypted!
. 207-218.
Full Text via DOI:
10.1145/3395351.3399421
2019
A Digital Forensics Framework for Smart Settings
. 332-333.
Full Text via DOI:
10.1145/3317549.3326317
Web of Science:
000477981300053
2019
An Analysis of Malware Trends in Enterprise Networks
.
DISTRIBUTED COMPUTING (DISC 2014)
. 360-380.
Full Text via DOI:
10.1007/978-3-030-30215-3_18
Web of Science:
000565241600018
2019
CURIE: Policy-based Secure Data Exchange
. 121-132.
Full Text via DOI:
10.1145/3292006.3300042
Web of Science:
000470891000011
2018
IoT-enabled Smart Lighting Systems for Smart Cities
. 639-645.
Web of Science:
000451221100103
2018
WACA: Wearable-Assisted Continuous Authentication
. 264-269.
Full Text via DOI:
10.1109/SPW.2018.00042
Web of Science:
000674762400034
2017
Achieving Secure and Differentially Private Computations in Multiparty Settings
. 49-59.
Full Text via DOI:
10.1109/PAC.2017.12
Web of Science:
000428577000005
Other Scholarly Work
2019
A privacy-preserving multifactor authentication system (vol 2, e88, 2019)
Full Text via DOI:
10.1002/spy2.94
Web of Science:
000754969300004
Preprint
2024
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Full Text via DOI:
10.48550/arxiv.2403.03858
2024
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
Full Text via DOI:
10.48550/arxiv.2402.03114
2024
A Survey on Decentralized Identifiers and Verifiable Credentials
Full Text via DOI:
10.48550/arxiv.2402.02455
2021
SoK: Cryptojacking Malware
Full Text via DOI:
10.48550/arxiv.2103.03851
2019
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home
Full Text via DOI:
10.48550/arxiv.1911.10186
2019
An Analysis of Malware Trends in Enterprise Networks
Full Text via DOI:
10.48550/arxiv.1910.00508
2018
IoTDots: A Digital Forensics Framework for Smart Environments
Full Text via DOI:
10.48550/arxiv.1809.00745
2018
Peek-a-Boo: I see your smart home activities, even encrypted!
Full Text via DOI:
10.48550/arxiv.1808.02741
2018
WACA: Wearable-Assisted Continuous Authentication
2017
Achieving Secure and Differentially Private Computations in Multiparty Settings
Full Text via DOI:
10.48550/arxiv.1707.01871
2017
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Full Text via DOI:
10.48550/arxiv.1704.03578
2017
Curie: Policy-based Secure Data Exchange
Full Text via DOI:
10.48550/arxiv.1702.08342
A Review of On-Device Machine Learning for Iot: An Energy
Full Text via DOI:
10.2139/ssrn.4356606
Review
2024
A review of on-device machine learning for IoT: An energy perspective
.
AD HOC NETWORKS
.
Full Text via DOI:
10.1016/j.adhoc.2023.103348
Web of Science:
001115634700001
visualizations
Co-author Network
Map of Science