A Collaborative Intrusion Detection System Using Snort IDS Nodes.
CoRR, April, 2025
Using deep graph learning to improve dynamic analysis-based malware detection in PE files.
J. Comput. Virol. Hacking Tech., 2024
Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection.
Knowl. Based Syst., 2024
Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection.
Proceedings of the International Conference on Computing and Communication Technologies, 2023
A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based Network Intrusion Detection.
Proceedings of the 14th International Conference on Knowledge and Systems Engineering, 2022
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking.
Future Internet, 2020
An Ensemble Detection Model Using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities.
IEEE Access, 2020
Intrusion Detection Using Extremely Limited Data Based on SDN.
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020
Towards an Approach for Fuel Poverty Detection from Gas Smart Meter Data using Decision Tree Learning.
Proceedings of the IMMS 2020: 2020 3rd International Conference on Information Management and Management Science, 2020
Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Behaviour-aware Malware Classification: Dynamic Feature Selection.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019
A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019
A Deep Learning Approach to Network Intrusion Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2018
Critical Infrastructure Testbed for Cyber-Security Training and Research.
Proceedings of the UKAIS 2016, 2016
Secure proximity-based identity pairing using an untrusted signalling service.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Digital Memories Based Mobile User Authentication for IoT.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Rail Internet of Things: An Architectural Platform and Assured Requirements Model.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Detecting misbehaviour in a complex system-of-systems environment.
PhD thesis, 2014
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Misbehaviour monitoring on system-of-systems components.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013