Nitin Naik
Orcid: 0000-0002-0659-9646
According to our database1,
Nitin Naik
authored at least 84 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training.
Inf. Sci., 2025
Leveraging ensemble clustering for privacy-preserving data fusion: Analysis of big social-media data in tourism.
Inf. Sci., 2025
2023
Wirel. Networks, April, 2023
Transformation-Based Fuzzy Rule Interpolation With Mahalanobis Distance Measures Supported by Choquet Integral.
IEEE Trans. Fuzzy Syst., April, 2023
A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity.
IEEE Access, 2023
Proceedings of the Advances in Computational Intelligence Systems, 2023
Proceedings of the Advances in Computational Intelligence Systems, 2023
The Changing Landscape of Machine Learning: A Comparative Analysis of Centralized Machine Learning, Distributed Machine Learning and Federated Machine Learning.
Proceedings of the Advances in Computational Intelligence Systems, 2023
Proceedings of the Advances in Computational Intelligence Systems, 2023
Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2023
Proceedings of the Advances in Computational Intelligence Systems, 2023
2022
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.
Comput. Secur., 2022
Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2022
2021
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation.
IEEE Trans. Emerg. Top. Comput. Intell., 2021
Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging.
Sensors, 2021
Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation.
Expert Syst. J. Knowl. Eng., 2021
Digit. Investig., 2021
Cloud-Agnostic and Lightweight Big Data Processing Platform in Multiple Clouds Using Docker Swarm and Terraform.
Proceedings of the Advances in Computational Intelligence Systems, 2021
Fuzzy Intelligent System for Improving High Availability of a Docker-Based Hybrid Cloud Infrastructure.
Proceedings of the Advances in Computational Intelligence Systems, 2021
Proceedings of the IEEE International Systems Conference, 2021
An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology.
Proceedings of the IEEE International Symposium on Systems Engineering, 2021
Proceedings of the IEEE International Symposium on Systems Engineering, 2021
Proceedings of the IEEE International Symposium on Systems Engineering, 2021
Proceedings of the IEEE International Symposium on Systems Engineering, 2021
2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020
A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020
A Comparative Study of Genetic Algorithm and Particle Swarm optimisation for Dendritic Cell Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020
Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020
2019
Proceedings of the Advances in Computational Intelligence Systems, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems.
Proceedings of the International Symposium on Systems Engineering, 2019
A Web Based Method for Managing PRINCE2<sup>®</sup> Projects Using Trello<sup>®</sup>.
Proceedings of the International Symposium on Systems Engineering, 2019
Adaptive Activation Function Generation for Artificial Neural Networks through Fuzzy Inference with Application in Grooming Text Categorisation.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Learning Agile Scrum Methodology Using the Groupware Tool Trello $$^{\textregistered }$$ Through Collaborative Working.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development.
Proceedings of the IEEE Conference on Games, 2019
2018
IEEE Trans. Fuzzy Syst., 2018
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots.
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
2017
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017
Choice of suitable Identity and Access Management standards for mobile computing and communication.
Proceedings of the 24th International Conference on Telecommunications, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Lightweight and Cost-Effective Spectrum Analyser Based on Software Defined Radio and Raspberry Pi.
Proceedings of the 2017 European Modelling Symposium (EMS), 2017
2016
Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Crowdsourcing, Open-Sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016
A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016
Migrating from Virtualization to Dockerization in the Cloud: Simulation and Evaluation of Distributed Systems.
Proceedings of the 10th IEEE International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments, 2016
Proceedings of the IEEE International Symposium on Systems Engineering, 2016
Connecting google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere.
Proceedings of the IEEE International Symposium on Systems Engineering, 2016
Proceedings of the IEEE International Symposium on Systems Engineering, 2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Choice of effective fitness functions for genetic algorithm-aided dynamic fuzzy rule interpolation.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014
2013
2012
Proceedings of the 12th UK Workshop on Computational Intelligence, 2012