Select Publications
Book Chapters
, 2025, 'A Graph-Based Approach for Software Functionality Classification on the Web', in , pp. 58 - 73, http://dx.doi.org/10.1007/978-981-96-0576-7_5
, 2025, 'A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks', in , pp. 204 - 215, http://dx.doi.org/10.1007/978-981-96-0576-7_16
, 2025, 'Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics', in , pp. 399 - 414, http://dx.doi.org/10.1007/978-981-96-9101-2_21
, 2024, 'Discovering Graph Differential Dependencies', in Lecture Notes in Computer Science, Springer Nature Switzerland, pp. 259 - 272, http://dx.doi.org/10.1007/978-3-031-47843-7_18
, 2021, 'Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution', in , pp. 57 - 71, http://dx.doi.org/10.1007/978-3-030-67550-9_5
Journal articles
, 2025, 'A novel technique for ransomware detection using image based dynamic features and transfer learning to address dataset limitations', Scientific Reports, 15, http://dx.doi.org/10.1038/s41598-025-17647-1
, 2025, 'ConceptUML: Multiphase unsupervised threat detection via latent concept learning, Hidden Markov Models and topic modelling', Journal of Information Security and Applications, 93, http://dx.doi.org/10.1016/j.jisa.2025.104160
, 2025, 'The evolving threat landscape of botnets: Comprehensive analysis of detection techniques in the age of artificial intelligence', Internet of Things the Netherlands, 33, http://dx.doi.org/10.1016/j.iot.2025.101728
, 2025, 'A comprehensive survey on AI-enabled secure social industrial Internet of Things in the agri-food supply chain', Smart Agricultural Technology, 11, http://dx.doi.org/10.1016/j.atech.2025.100902
, 2025, 'A Survey on Unauthorized UAV Threats to Smart Farming', Drones, 9, http://dx.doi.org/10.3390/drones9040251
, 2025, 'Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting', Journal of Network and Computer Applications, 236, http://dx.doi.org/10.1016/j.jnca.2025.104127
, 2025, 'Pseudorandom bit generation with asymmetric numeral systems', International Journal of Information Security, 24, http://dx.doi.org/10.1007/s10207-025-00995-4
, 2025, 'A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments', Sensors, 25, http://dx.doi.org/10.3390/s25041153
, 2025, 'Toward Privacy-Preserving Data Sharing - An Australian Healthcare Perspective', IEEE Access, 13, pp. 39405 - 39427, http://dx.doi.org/10.1109/ACCESS.2025.3545778
, 2024, 'Evolving techniques in cyber threat hunting: A systematic review', Journal of Network and Computer Applications, 232, http://dx.doi.org/10.1016/j.jnca.2024.104004
, 2024, 'Security threats to agricultural artificial intelligence: Position and perspective', Computers and Electronics in Agriculture, 227, http://dx.doi.org/10.1016/j.compag.2024.109557
, 2024, 'Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method', Journal of Information Security and Applications, 86, http://dx.doi.org/10.1016/j.jisa.2024.103873
, 2024, 'Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems', Computers and Security, 140, http://dx.doi.org/10.1016/j.cose.2024.103754
, 2024, 'AI-Based Ransomware Detection: A Comprehensive Review', IEEE Access, 12, pp. 136666 - 136695, http://dx.doi.org/10.1109/ACCESS.2024.3461965
, 2023, 'The Compression Optimality of Asymmetric Numeral Systems', Entropy, 25, http://dx.doi.org/10.3390/e25040672
, 2023, 'A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms', IEEE Access, 11, pp. 121118 - 121141, http://dx.doi.org/10.1109/ACCESS.2023.3328351
, 2022, 'ANS-based compression and encryption with 128-bit security', International Journal of Information Security, 21, pp. 1051 - 1067, http://dx.doi.org/10.1007/s10207-022-00597-4
, 2021, 'Compcrypt-Lightweight ANS-Based Compression and Encryption', IEEE Transactions on Information Forensics and Security, 16, pp. 3859 - 3873, http://dx.doi.org/10.1109/TIFS.2021.3096026
, 2020, 'Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling', IEEE Access, 8, pp. 228818 - 228830, http://dx.doi.org/10.1109/ACCESS.2020.3044277
, 2017, 'A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts', IEEE Access, 5, pp. 27740 - 27756, http://dx.doi.org/10.1109/ACCESS.2017.2772787
Conference Papers
, 2025, 'Social Engineering Attacks: A Systemisation of Knowledge on People Against Humans', in 2025 IEEE International Conference on Big Data (BigData), IEEE, pp. 3752 - 3761, presented at 2025 IEEE International Conference on Big Data (BigData), 08 December 2025 - 11 December 2025, http://dx.doi.org/10.1109/bigdata66926.2025.11402315
, 2025, 'Multi-Stage Payload Execution with Fragmented Double-Layer Encoding', in Proceedings of IEEE ACS International Conference on Computer Systems and Applications Aiccsa, http://dx.doi.org/10.1109/AICCSA66935.2025.11315276
, 2024, 'Malicious Package Detection using Metadata Information', in Www 2024 Proceedings of the ACM Web Conference, pp. 1779 - 1789, http://dx.doi.org/10.1145/3589334.3645543
, 2024, 'File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 213 - 233, http://dx.doi.org/10.1007/978-981-97-7737-2_12
, 2018, 'Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol', in 2018 International Conference on Smart Computing and Electronic Enterprise Icscee 2018, http://dx.doi.org/10.1109/ICSCEE.2018.8538400
Preprints
, 2025, Social Engineering Attacks: A Systemisation of Knowledge on People Against Humans, http://dx.doi.org/10.48550/arxiv.2601.04215
, 2025, Setup Once, Secure Always: A Single-Setup Secure Federated Learning Aggregation Protocol with Forward and Backward Secrecy for Dynamic Users, http://dx.doi.org/10.48550/arxiv.2502.08989
, 2025, Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks, http://dx.doi.org/10.48550/arxiv.2504.20681
, 2024, Malicious Package Detection using Metadata Information, http://dx.doi.org/10.48550/arxiv.2402.07444
, 2022, Compression Optimality of Asymmetric Numeral Systems, http://dx.doi.org/10.48550/arxiv.2209.02228