Select Publications
Preprints
, 2025, SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers, http://dx.doi.org/10.48550/arxiv.2503.20093
, 2025, Beyond Life: A Digital Will Solution for Posthumous Data Management, http://dx.doi.org/10.48550/arxiv.2501.04900
, 2025, Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models, http://dx.doi.org/10.48550/arxiv.2501.02520
, 2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172
, 2024, Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification, http://dx.doi.org/10.48550/arxiv.2407.19662
, 2024, AuditNet: A Conversational AI-based Security Assistant [DEMO], http://arxiv.org/abs/2407.14116v1
, 2024, Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data, http://dx.doi.org/10.48550/arxiv.2407.01282
, 2022, AI for Next Generation Computing: Emerging Trends and Future Directions, http://dx.doi.org/10.48550/arxiv.2203.04159
, 2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, http://dx.doi.org/10.48550/arxiv.2111.11874
, 2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, http://dx.doi.org/10.48550/arxiv.2010.12134
, 2020, Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication, http://dx.doi.org/10.48550/arxiv.2010.05144
, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
, 2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, http://dx.doi.org/10.48550/arxiv.2004.01855
, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, http://dx.doi.org/10.48550/arxiv.1809.06988
, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, http://dx.doi.org/10.48550/arxiv.1807.02593
, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, http://dx.doi.org/10.48550/arxiv.1804.00262
, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, http://dx.doi.org/10.48550/arxiv.1708.05477
, 2016, Towards Policy Enforcement Point as a Service (PEPS), http://dx.doi.org/10.48550/arxiv.1610.02526