Amir Javed

Orcid: 0000-0001-9761-0945

According to our database1, Amir Javed authored at least 24 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles.
Sensors, June, 2024

A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning.
Veh. Commun., 2024

Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure.
J. Cybersecur. Priv., December, 2023

Correction: Is COVID-19 Being Used to Spread Malware.
SN Comput. Sci., September, 2023

Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review.
J. Cybersecur. Priv., September, 2023

Is COVID-19 Being Used to Spread Malware.
SN Comput. Sci., July, 2023

A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT.
IEEE Internet Things J., February, 2023

Digital fingerprinting for identifying malicious collusive groups on Twitter.
J. Cybersecur., January, 2023

2022
Security analytics for real-time forecasting of cyberattacks.
Softw. Pract. Exp., 2022

Disrupting drive-by download networks on Twitter.
Soc. Netw. Anal. Min., 2022

Adversarial machine learning in IoT from an insider point of view.
J. Inf. Secur. Appl., 2022

2021
"Chatty Devices" and edge-based activity classification.
Discov. Internet Things, 2021

Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks.
Comput. Secur., 2021

2020
Emotions Behind Drive-by Download Propagation on Twitter.
ACM Trans. Web, 2020

2019
Prediction of drive-by download attacks on Twitter.
Inf. Process. Manag., 2019

2018
Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Real Time Prediction of Drive by Download Attacks on Twitter.
CoRR, 2017

A Cloud-Based Energy Management System for Building Managers.
Proceedings of the Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, 2017

Fog Paradigm for Local Energy Management Systems.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

2015
Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Real-time Classification of Malicious URLs on Twitter using Machine Activity Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2013
Comparison of glacier change detection using pixel based and object based classification techniques.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013


  Loading...