Naeem Firdous Syed
Orcid: 0000-0003-2450-4337Affiliations:
- Deakin University, Centre for Cyber Security Research and Innovation, Geelong, Australia
According to our database1,
Naeem Firdous Syed
authored at least 22 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
The Role of Rule Mining in Generating Synthetic Cyber-Physical System Attack Samples.
IEEE Internet Things Mag., November, 2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks.
Comput. Networks, April, 2023
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
2022
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning.
Future Internet, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021
Comput. Networks, 2021
2020
J. Inf. Telecommun., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
2017
Digit. Investig., 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
2013
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Secur. Commun. Networks, 2013
2011
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Proceedings of the 2011 International Conference on Cyberworlds, 2011
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011
Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications, 2011