Zahra Jadidi

Orcid: 0000-0002-6694-7753

According to our database1, Zahra Jadidi authored at least 43 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A graph representation framework for encrypted network traffic classification.
Comput. Secur., 2025

2024
Federated Zero Trust Architecture using Artificial Intelligence.
IEEE Wirel. Commun., April, 2024

Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024

Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain.
Comput. Networks, 2024

The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis.
IEEE Access, 2024

2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments.
IEEE Internet Things Mag., March, 2023

The Role of Cyber Threat Intelligence Sharing in the Metaverse.
IEEE Internet Things Mag., March, 2023

Correlation-Based Anomaly Detection in Industrial Control Systems.
Sensors, February, 2023

Software Vulnerability Detection Using Informed Code Graph Pruning.
IEEE Access, 2023

Security, Privacy and Trust for the Metaverse of Things.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence.
Proceedings of the 16th International Conference on Sensing Technology, 2023

Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023

A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A two-pass approach for minimising error in synthetically generated network traffic data sets.
Proceedings of the 2023 Australasian Computer Science Week, 2023

Encrypted Network Traffic Classification with Higher Order Graph Neural Network.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022

Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing.
CoRR, 2022

Multi-step attack detection in industrial control systems using causal analysis.
Comput. Ind., 2022

Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
IEEE Access, 2022

SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery.
Proceedings of the IEEE International Conference on Trust, 2022

A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain.
Proceedings of the IEEE International Conference on Trust, 2022

A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Design and Development of Automated Threat Hunting in Industrial Control Systems.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities.
Sensors, 2021

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives.
CoRR, 2021

A Threat Hunting Framework for Industrial Control Systems.
IEEE Access, 2021

System-Wide Anomaly Detection of Industrial Control Systems via Deep Learning and Correlation Analysis.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

2020
Securing Manufacturing Using Blockchain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2017
The Use of Machine Learning for Correlation Analysis of Sentiment and Weather Data.
Proceedings of the Robot Intelligence Technology and Applications 5, 2017

A Drone-Based Building Inspection System Using Software-Agents.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

2016
Intelligent Sampling Using an Optimized Neural Network.
J. Networks, 2016

A probabilistic sampling method for efficient flow-based analysis.
J. Commun. Networks, 2016

2015
Performance of Flow-based Anomaly Detection in Sampled Traffic.
J. Networks, 2015

Flow-based anomaly detection using semisupervised learning.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015

2014
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network.
Neural Comput. Appl., 2014

2013
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Metaheuristic algorithms based Flow Anomaly Detector.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

2012
Intrusion detection using reduced-size RNN based on feature grouping.
Neural Comput. Appl., 2012

2010
Tecno-Streams approach for content-based image retrieval.
Proceedings of the Second World Congress on Nature & Biologically Inspired Computing, 2010


  Loading...