Select Publications
Journal articles
2024, 'Evolving techniques in cyber threat hunting: A systematic review', Journal of Network and Computer Applications, 232, http://dx.doi.org/10.1016/j.jnca.2024.104004
,2024, 'Security threats to agricultural artificial intelligence: Position and perspective', Computers and Electronics in Agriculture, 227, http://dx.doi.org/10.1016/j.compag.2024.109557
,2024, 'Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method', Journal of Information Security and Applications, 86, http://dx.doi.org/10.1016/j.jisa.2024.103873
,2024, 'Adaptive identification of supply chain disruptions through reinforcement learning', Expert Systems with Applications, 248, pp. 123477, http://dx.doi.org/10.1016/j.eswa.2024.123477
,2024, 'Construction supply chain risk management', Automation in Construction, 162, http://dx.doi.org/10.1016/j.autcon.2024.105396
,2024, 'Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems', Computers and Security, 140, http://dx.doi.org/10.1016/j.cose.2024.103754
,2024, 'Transformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia', IEEE Access, 12, pp. 41829 - 41851, http://dx.doi.org/10.1109/ACCESS.2024.3377232
,2023, 'Reinforcement Learning-Based News Recommendation System', IEEE Transactions on Services Computing, 16, pp. 4493 - 4502, http://dx.doi.org/10.1109/TSC.2023.3326197
,2022, 'A reinforcement learning-based framework for disruption risk identification in supply chains', Future Generation Computer Systems, 126, pp. 110 - 122, http://dx.doi.org/10.1016/j.future.2021.08.004
,2021, 'Joint optimization of maintenance and inventory policies for multi-unit systems', International Journal of System Assurance Engineering and Management, 12, pp. 587 - 607, http://dx.doi.org/10.1007/s13198-021-01123-w
,2021, 'A survey on the suitability of risk identification techniques in the current networked environment', Journal of Network and Computer Applications, 178, http://dx.doi.org/10.1016/j.jnca.2021.102984
,2018, 'ZBWM: The Z-number extension of Best Worst Method and its application for supplier development', Expert Systems with Applications, 107, pp. 115 - 125, http://dx.doi.org/10.1016/j.eswa.2018.04.015
,2018, 'Analysis of dynamics competitiveness by using strategic groups maps: Case of furniture industry', International Journal of Business Analytics, 5, pp. 52 - 66, http://dx.doi.org/10.4018/IJBAN.2018070104
,Conference Papers
2024, 'Named Entity Recognition in Construction Supply Chain Risk Management Using Transformer-Based Models and Genetic Algorithm-Driven Hyperparameter Tuning', in International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024, http://dx.doi.org/10.1109/ICECET61485.2024.10698305
,2023, 'A News Recommendation System for Environmental Risk Management', in CEUR Workshop Proceedings
,2023, 'POSSUM: PrOactive diSruption riSk identification for sUpply chain Management', in 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023, pp. 319 - 321, http://dx.doi.org/10.1109/PerComWorkshops56833.2023.10150317
,