ORCID as entered in ROS

Select Publications
2025, 'Effects of printing parameters on the quasi-static and dynamic compression behaviour of 3D-printed re-entrant auxetic structures', Thin-Walled Structures, 210, http://dx.doi.org/10.1016/j.tws.2025.113000
,2025, 'Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks', Remote Sensing, http://dx.doi.org/10.3390/rs17040583
,2025, 'Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks', Remote Sensing, http://dx.doi.org/10.3390/rs17040583
,2025, 'The Frontier of Data Erasure: A Survey on Machine Unlearning for Large Language Models', Computer, 58, pp. 45 - 57, http://dx.doi.org/10.1109/MC.2024.3405397
,2025, 'Can LLM-Generated Misinformation Be Detected: A Study On Cyber Threat Intelligence', Future generations computer systems, pp. 107877 - 107877, http://dx.doi.org/10.1016/j.future.2025.107877
,2023, 'Cyber Information Retrieval Through Pragmatics Understanding and Visualization', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1186 - 1199, http://dx.doi.org/10.1109/TDSC.2022.3151148
,2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys and Tutorials, 25, pp. 1748 - 1774, http://dx.doi.org/10.1109/COMST.2023.3273282
,2023, 'On the Development of a Protection Profile Module for Encryption Key Management Components', IEEE Access, 11, pp. 9113 - 9121, http://dx.doi.org/10.1109/ACCESS.2023.3239043
,2022, 'Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges', IEEE Access, 10, pp. 44756 - 44777, http://dx.doi.org/10.1109/ACCESS.2022.3168716
,2022, 'How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond', IEEE Access, 10, pp. 71749 - 71763, http://dx.doi.org/10.1109/ACCESS.2022.3187211
,2022, 'Near real-time twitter spam detection with machine learning techniques', International Journal of Computers and Applications, 44, pp. 338 - 348, http://dx.doi.org/10.1080/1206212X.2020.1751387
,2019, 'Data-Driven Cybersecurity Incident Prediction: A Survey', IEEE Communications Surveys and Tutorials, 21, pp. 1744 - 1772, http://dx.doi.org/10.1109/COMST.2018.2885561
,2017, 'Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability', IEEE Access, 5, pp. 11142 - 11154, http://dx.doi.org/10.1109/ACCESS.2017.2710540
,