Benjamin P. Turnbull
Orcid: 0000-0003-0440-5032
According to our database1,
Benjamin P. Turnbull
authored at least 69 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
VIFL: vulnerability identification using federated learning in the internet of things systems.
Computing, January, 2025
BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems.
Ad Hoc Networks, 2025
2024
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems.
Cogn. Comput., September, 2024
A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks.
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks.
IEEE Trans. Consumer Electron., February, 2024
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids.
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
2023
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities.
Sensors, September, 2023
Inf. Sci., August, 2023
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey.
ACM Comput. Surv., 2023
Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards.
IEEE Access, 2023
2022
Wirel. Networks, 2022
Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2022
A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.
IEEE Open J. Comput. Soc., 2022
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems.
Ad Hoc Networks, 2022
2021
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture.
IEEE Open J. Comput. Soc., 2021
IEEE Open J. Comput. Soc., 2021
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021
IEEE Access, 2021
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021
Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies.
IEEE Access, 2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020
A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions.
IEEE Access, 2020
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020
A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks.
Proceedings of the Intelligent Systems and Applications, 2020
Proceedings of the 15th International Joint Conference on Computer Vision, 2020
A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems.
Proceedings of the AI 2020: Advances in Artificial Intelligence, 2020
2019
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019
Int. J. Cyber Warf. Terror., 2019
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019
2018
IEEE Access, 2018
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017
Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success.
Int. J. Cyber Warf. Terror., 2017
2015
Automated event and social network extraction from digital evidence sources with ontological mapping.
Digit. Investig., 2015
Proceedings of the 2015 Winter Simulation Conference, 2015
Proceedings of the 12th IEEE Symposium on Visualization for Cyber Security, 2015
2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2010
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation.
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Forensics in Telecommunications, 2009
Proceedings of the Forensics in Telecommunications, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications.
J. Digit. Forensics Secur. Law, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the The Third International Conference on Availability, 2008
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
Proceedings of the The Third International Conference on Availability, 2008
2007
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2006
2005
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Googling Forensics.
Proceedings of 3rd Australian Computer, 2005
2004
Proceedings of the Pacific Asia Conference on Information Systems, 2004