Select Publications

Journal articles

Adi E; Baig Z; Zeadally S, 2022, 'Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions', Applied Cybersecurity & Internet Governance, 1, pp. 1 - 23, http://dx.doi.org/10.5604/01.3001.0016.0800

Sabani AC; Manuaba IBK; Adi E, 2021, 'Gamification: Blood Donor Apps for IOS Devices', Journal of Games, Game Art, and Gamification, 1, pp. 14 - 26, http://dx.doi.org/10.21512/jggag.v1i1.7247

Khan R; Adi E; Hussain O, 2021, 'AI-based audit of fuzzy front end innovation using ISO56002', Managerial Auditing Journal, 36, pp. 564 - 590, http://dx.doi.org/10.1108/MAJ-03-2020-2588

Adi E; Anwar A; Baig Z; Zeadally S, 2020, 'Machine learning and data analytics for the IoT', Neural Computing and Applications, 32, pp. 16205 - 16233, http://dx.doi.org/10.1007/s00521-020-04874-y

Zeadally S; Adi E; Baig Z; Khan IA, 2020, 'Harnessing artificial intelligence capabilities to improve cybersecurity', IEEE Access, 8, pp. 23817 - 23837, http://dx.doi.org/10.1109/ACCESS.2020.2968045

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Yang W; Wang S; Hu J; Zheng G; Chaudhry J; Adi E; Valli C, 2018, 'Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem', IEEE Access, 6, pp. 36939 - 36947, http://dx.doi.org/10.1109/ACCESS.2018.2844182

Adi E; Baig Z; Hingston P, 2017, 'Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services', Journal of Network and Computer Applications, 91, pp. 1 - 13, http://dx.doi.org/10.1016/j.jnca.2017.04.015

Adi E; Baig ZA; Hingston P; Lam CP, 2016, 'Distributed denial-of-service attacks against HTTP/2 services', Cluster Computing, 19, pp. 79 - 86, http://dx.doi.org/10.1007/s10586-015-0528-7

Adi E; Aditya I; Citrawati M, 2010, 'Learn Street Skateboarding through 3D Simulations of Angle Rotations', JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-RESEARCH, 9, pp. 217 - 234, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000210176200012&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Conference Papers

Micallef N; Adi E; Misra G, 2018, 'Investigating login features in smartphone apps', in UbiComp/ISWC 2018 - Adjunct Proceedings of the 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2018 ACM International Symposium on Wearable Computers, pp. 842 - 851, http://dx.doi.org/10.1145/3267305.3274172

Adi E; Baig Z, 2017, 'Intelligent feature selection for detecting HTTP/2 denial of service attacks', in Proceedings of the 15th Australian Information Security Management Conference, AISM 2017, pp. 57 - 63

Adi E; Baig Z; Lam CP; Hingston P, 2015, 'Low-rate denial-of-service attacks against HTTP/2 services', in 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings, http://dx.doi.org/10.1109/ICITCS.2015.7292994

Adi E, 2012, 'A design of a proxy inspired from human immune system to detect sql injection and cross-site scripting', in Procedia Engineering, pp. 19 - 28, http://dx.doi.org/10.1016/j.proeng.2012.10.003

Kosala R; Adi E; Steven , 2012, 'Harvesting real time traffic information from twitter', in Procedia Engineering, pp. 1 - 11, http://dx.doi.org/10.1016/j.proeng.2012.10.001

Martinez JJL; Adi E, 2011, 'A Study to Design a Low Cost and Marketable Game', in Dan C (ed.), MANAGEMENT AND ARTIFICIAL INTELLIGENCE, INT ASSOC COMPUTER SCIENCE & INFORMATION TECHNOLOGY PRESS-IACSIT PRESS, INDONESIA, Bali, pp. 56 - 59, presented at International Conference on Management and Artificial Intelligence (ICMAI 2011), INDONESIA, Bali, 01 April 2011 - 03 April 2011, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000303279400012&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Dharmawirya M; Adi E, 2011, 'Case Study for Restaurant Queuing Model', in Dan C (ed.), MANAGEMENT AND ARTIFICIAL INTELLIGENCE, INT ASSOC COMPUTER SCIENCE & INFORMATION TECHNOLOGY PRESS-IACSIT PRESS, INDONESIA, Bali, pp. 52 - +, presented at International Conference on Management and Artificial Intelligence (ICMAI 2011), INDONESIA, Bali, 01 April 2011 - 03 April 2011, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000303279400011&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Widjaja ND; Adi E, 2010, '3D product viewer for e-commerce applications', in Proceedings of the International Conference on Electronic Business (ICEB), pp. 241 - 246

Adi E; Salomo I, 2010, 'Detect and sanitise encoded Cross-Site Scripting and SQL injection attack strings using a hash map', in Proceedings of the 8th Australian Information Security Management Conference, pp. 1 - 7

Adi E; Ningsih SA, 2010, 'Ubiquitous public transportation route guide for a developing country', in 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pp. 263 - 268, http://dx.doi.org/10.1109/WAINA.2010.36

Preprints

Adi E; Anwar A; Baig Z; Zeadally S, 2020, Machine learning and data analytics for the IoT, , http://dx.doi.org/10.48550/arxiv.2007.04093


Back to profile page