Vrizlynn L. L. Thing
Orcid: 0000-0003-4424-8596
According to our database1,
Vrizlynn L. L. Thing
authored at least 111 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Evaluating The Explainability of State-of-the-Art Machine Learning-based IoT Network Intrusion Detection Systems.
CoRR, 2024
CoRR, 2024
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies.
CoRR, 2024
Enhancing network intrusion detection performance using generative adversarial networks.
Comput. Secur., 2024
An adversarial attack approach for eXplainable AI evaluation on deepfake detection models.
Comput. Secur., 2024
ExpIDS: A Drift-Adaptable Network Intrusion Detection System with Improved Explainability.
Proceedings of the 34th International Telecommunication Networks and Applications Conference, 2024
CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Digit. Gov. Res. Pract., December, 2023
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms.
Comput. Secur., May, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study.
Comput. Secur., 2022
Proceedings of the 7th International Conference on Internet of Things, 2022
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector.
CoRR, 2021
Three decades of deception techniques in active cyber defense - Retrospect and outlook.
Comput. Secur., 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
2020
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification.
Int. J. Digit. Crime Forensics, 2020
2019
J. Vis. Commun. Image Represent., 2019
A scalable and extensible framework for android malware detection and family attribution.
Comput. Secur., 2019
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the IEEE International Symposium on Multimedia, 2019
2018
IEEE/ACM Trans. Netw., 2018
A semi-feature learning approach for tampered region localization across multi-format images.
Multim. Tools Appl., 2018
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018
Proceedings of the IEEE 4th International Conference on Identity, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Comput. Networks, 2017
IEEE Access, 2017
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification.
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Signal Process., 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness.
IEEE ACM Trans. Audio Speech Lang. Process., 2015
A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection.
Int. J. Electron. Secur. Digit. Forensics, 2015
Comput. Networks, 2015
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Advances in Digital Forensics X, 2014
2013
J. Vis. Commun. Image Represent., 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Working Notes for CLEF 2013 Conference , 2013
2012
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012
Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012
Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012
2011
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Proceedings of the Security Technology, 2011
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification.
Proceedings of the Security Technology, 2011
Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification.
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
IEEE Trans. Netw. Serv. Manag., 2009
Proceedings of the Integrated Network Management, 2009
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2005
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
2004
IEEE Trans. Commun., 2004
2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of IEEE International Conference on Communications, 2003
2002
Designs and analysis of local mobility agents discovery, selection and failure detection for Mobile IPv6.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002