Nitin Naik

Orcid: 0000-0002-0659-9646

According to our database1, Nitin Naik authored at least 84 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training.
Inf. Sci., 2025

Leveraging ensemble clustering for privacy-preserving data fusion: Analysis of big social-media data in tourism.
Inf. Sci., 2025

2023
Special issue on emerging trends, challenges and applications in cloud computing.
Wirel. Networks, April, 2023

Transformation-Based Fuzzy Rule Interpolation With Mahalanobis Distance Measures Supported by Choquet Integral.
IEEE Trans. Fuzzy Syst., April, 2023

A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity.
IEEE Access, 2023

Demystifying the Working, Types, Benefits and Limitations of Chatbots.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Artificial Intelligence (AI) Applications in Chemistry.
Proceedings of the Advances in Computational Intelligence Systems, 2023

The Changing Landscape of Machine Learning: A Comparative Analysis of Centralized Machine Learning, Distributed Machine Learning and Federated Machine Learning.
Proceedings of the Advances in Computational Intelligence Systems, 2023

An Introduction to Federated Learning: Working, Types, Benefits and Limitations.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Analysing Cyberattacks Using Attack Tree and Fuzzy Rules.
Proceedings of the Advances in Computational Intelligence Systems, 2023

2022
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.
Comput. Secur., 2022

Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2022

2021
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging.
Sensors, 2021

Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation.
Expert Syst. J. Knowl. Eng., 2021

Fuzzy-import hashing: A static analysis technique for malware detection.
Digit. Investig., 2021

Cloud-Agnostic and Lightweight Big Data Processing Platform in Multiple Clouds Using Docker Swarm and Terraform.
Proceedings of the Advances in Computational Intelligence Systems, 2021

Fuzzy Intelligent System for Improving High Availability of a Docker-Based Hybrid Cloud Infrastructure.
Proceedings of the Advances in Computational Intelligence Systems, 2021

Performance Evaluation of Distributed Systems in Multiple Clouds using Docker Swarm.
Proceedings of the IEEE International Systems Conference, 2021

An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology.
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

Does Sovrin Network Offer Sovereign Identity?
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

Comprehending Concurrency and Consistency in Distributed Systems.
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

Demystifying Properties of Distributed Systems.
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

2020
Consortium Blockchain for Security and Privacy-Preserving in E-government Systems.
CoRR, 2020

Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020

uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020

Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020

A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Fuzzy-Import Hashing: A Malware Analysis Approach.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

A Comparative Study of Genetic Algorithm and Particle Swarm optimisation for Dendritic Cell Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

2019
Integration of Interpolation and Inference with Multi-antecedent Rules.
Proceedings of the Advances in Computational Intelligence Systems, 2019

Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems.
Proceedings of the International Symposium on Systems Engineering, 2019

A Web Based Method for Managing PRINCE2<sup>®</sup> Projects Using Trello<sup>®</sup>.
Proceedings of the International Symposium on Systems Engineering, 2019

Adaptive Activation Function Generation for Artificial Neural Networks through Fuzzy Inference with Application in Grooming Text Categorisation.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Learning Agile Scrum Methodology Using the Groupware Tool Trello $$^{\textregistered }$$ Through Collaborative Working.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development.
Proceedings of the IEEE Conference on Games, 2019

2018
Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection.
IEEE Trans. Fuzzy Syst., 2018

Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots.
Proceedings of the 21st International Conference on Information Fusion, 2018

Dendritic Cell Algorithm with Optimised Parameters Using Genetic Algorithm.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Software CROWD-sourcing.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Small scale mobile energy management system using Raspberry Pi and Python.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

Choice of suitable Identity and Access Management standards for mobile computing and communication.
Proceedings of the 24th International Conference on Telecommunications, 2017

Augmented windows fuzzy firewall for preventing denial of service attack.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Lightweight and Cost-Effective Spectrum Analyser Based on Software Defined Radio and Raspberry Pi.
Proceedings of the 2017 European Modelling Symposium (EMS), 2017

2016
Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Crowdsourcing, Open-Sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Migrating from Virtualization to Dockerization in the Cloud: Simulation and Evaluation of Distributed Systems.
Proceedings of the 10th IEEE International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments, 2016

Flooded streets - A crowdsourced sensing system for disaster response: A case study.
Proceedings of the IEEE International Symposium on Systems Engineering, 2016

Connecting google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere.
Proceedings of the IEEE International Symposium on Systems Engineering, 2016

Building a virtual system of systems using docker swarm in multiple clouds.
Proceedings of the IEEE International Symposium on Systems Engineering, 2016

Web protocols and challenges of Web latency in the Web of Things.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Fuzzy reasoning based Windows Firewall for preventing denial of service attack.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Enhancing Windows Firewall Security Using Fuzzy Reasoning.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Choice of effective fitness functions for genetic algorithm-aided dynamic fuzzy rule interpolation.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

Fuzzy Inference Based Intrusion Detection System: FI-Snort.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Genetic algorithm-aided dynamic fuzzy rule interpolation.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

2013
Towards dynamic fuzzy rule interpolation.
Proceedings of the FUZZ-IEEE 2013, 2013

2012
Integration of interpolation and inference.
Proceedings of the 12th UK Workshop on Computational Intelligence, 2012


  Loading...