Marzia Zaman

Orcid: 0000-0002-0610-0470

According to our database1, Marzia Zaman authored at least 72 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-Phase Quantum Resistant Framework for Secure Communication in SCADA Systems.
IEEE Trans. Dependable Secur. Comput., 2024

Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator.
Int. J. Crit. Infrastructure Prot., 2024

Knowledge Graph Generation and Application for Unstructured Data Using Data Processing Pipeline.
IEEE Access, 2024

Using IOTA Tangle and Machine Learning for a Defensive Model-Based Approach Against Replication Attacks on Wireless Sensor Networks.
IEEE Access, 2024

Big Data Synthesis and Class Imbalance Rectification for Enhanced Forest Fire Classification Modeling.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

A Federated Learning Framework Based on Spatio-Temporal Agnostic Subsampling (STAS) for Forest Fire Prediction.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques.
DTRAP, 2023

Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System With SCADA.
IEEE Access, 2023

Data Balancing and CNN based Network Intrusion Detection System.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

A Framework Using Federated Learning for IoT-Based Forest Fire Prediction.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks.
Proceedings of the IEEE Global Communications Conference, 2023

Comparative Analysis of Tabular Generative Adversarial Network (GAN) Models for Generation and Validation of Power Grid Synthetic Datasets.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023

Knowledge Graph Generation for Unstructured Data Using Data Processing Pipeline.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Performance Evaluation of Transformer-based NLP Models on Fake News Detection Datasets.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Data Integration Framework with Multi-Source Big Data for Enhanced Forest Fire Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

Forest Fire Prediction Using Multi-Source Deep Learning.
Proceedings of the Big Data Technologies and Applications, 2023

2022
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems.
IEEE Trans. Netw. Serv. Manag., 2022

A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks.
Symmetry, 2022

Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks.
Sensors, 2022

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications.
IEEE Access, 2022

Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks.
Proceedings of the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks on 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2022

Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Anomaly Detection in SACP Cell Data using Changepoint and One-Class SVM.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

2021
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids.
IEEE Trans. Netw. Serv. Manag., 2021

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm.
IEEE Trans. Netw. Sci. Eng., 2021

Time Series Forecasting using Facebook Prophet for Cloud Resource Management.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Analytical Modeling and Prediction of Cloud Workload.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Neural Network Based Regression Model for Virtual Machines Migration Method Selection.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Container Placement for Resource Utilization in Cyber Physical Cloud Systems.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Energy-Efficient Algorithm for Robot-Assisted Sensor Deployment.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

2020
Dynamic K-Means Clustering of Workload and Cloud Resource Configuration for Cloud Elastic Model.
IEEE Access, 2020

2018
Markov Prediction Model for Host Load Detection and VM Placement in Live Migration.
IEEE Access, 2018

Characterization and Detection of Tail Energy Bugs in Smartphones.
IEEE Access, 2018

Evaluation of machine learning techniques for network intrusion detection.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

A Methodology for Generating Tests for Evaluating User-Centric Performance of Mobile Streaming Applications.
Proceedings of the Model-Driven Engineering and Software Development, 2018

Test Generation for Performance Evaluation of Mobile Multimedia Streaming Applications.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

A Power Signal Based Dynamic Approach to Detecting Anomalous Behavior in Wireless Devices.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

Linear and Logistic Regression Based Monitoring for Resource Management in Cloud Networks.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Analysis and Comparison of Live Virtual Machine Migration Methods.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Energy Routers for Residential AC Nano-PV Systems: Control and Security Considerations.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

Regression-Based Dynamic Provisioning and Monitoring for Responsive Resources in Cloud Infrastructure Networks.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Real Time Metering of Cloud Resource Reading Accurate Data Source Using Optimal Message Serialization and Format.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Detection of anomalous behavior of smartphones using signal processing and machine learning techniques.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Live VM Migration Across Cloud Data Centers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

A Markov-Based Prediction Model for Host Load Detection in Live VM Migration.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

Detection of unknown applications in smartphones: A signal processing perspective.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
Power trading in cognitive radio networks.
J. Netw. Comput. Appl., 2016

2014
Applications architectures and protocol design issues for cognitive radio networks: a survey.
Int. J. Wirel. Mob. Comput., 2014

Resource management techniques for handling uncertainties in user estimated job execution times.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2014

2013
A Framework for Automatic Resource Provisioning for Private Clouds.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

Middleware architecture for sensor-based bridge infrastructure management.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

Exposing resources as Web services: A performance oriented approach.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

A game theoretic approach to power trading in cognitive radio systems.
Proceedings of the 20th International Conference on Software, 2012

Reusing and converting code clones to aspects - An algorithmic approach.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

A price setting approach to power trading in cognitive radio networks.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

A game theoretic approach to spectrum management in cognitive radio network.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Higher layer issues in cognitive radio network.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A game theory approach: Dynamic behaviours for spectrum management in cognitive radio network.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Routing Management Algorithm Based on Spectrum Trading and Spectrum Competition in Cognitive Radio Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Environmental impact on optimization analysis for standalone and hybrid power generating units.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
A knowledge-base tool for testing VoIP gateway.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2007
Software Architecture Decomposition Using Attributes.
Int. J. Softw. Eng. Knowl. Eng., 2007

Towards A Performance-Oriented Self-Adaptive System.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

2006
Program restructuring using clustering techniques.
J. Syst. Softw., 2006

2005
Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

2004
Applications of clustering techniques to software partitioning, recovery and restructuring.
J. Syst. Softw., 2004

Using Clustering Technique to Restructure Programs.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Program Restructuring Through Clustering Techniques.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004


  Loading...