Select Publications
Journal articles
2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain', IEEE Access, 10, pp. 15681 - 15698, http://dx.doi.org/10.1109/ACCESS.2022.3146723
,2022, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2022.3184387
,2022, 'DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks', IEEE Transactions on Industrial Informatics, http://dx.doi.org/10.1109/TII.2022.3214652
,2022, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, http://dx.doi.org/10.1109/TEM.2022.3194487
,2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2488 - 2500, http://dx.doi.org/10.1109/TDSC.2021.3060775
,2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets', IEEE Internet of Things Journal, 9, pp. 485 - 496, http://dx.doi.org/10.1109/JIOT.2021.3085194
,2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT', Sustainable Cities and Society, 75, http://dx.doi.org/10.1016/j.scs.2021.103322
,2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing', Journal of Systems Architecture, 119, http://dx.doi.org/10.1016/j.sysarc.2021.102273
,2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets', Sustainable Cities and Society, 72, pp. 102994, http://dx.doi.org/10.1016/j.scs.2021.102994
,2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041
,2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231
,2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882
,2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
,2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua
,2021, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2021.3134463
,2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
,2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675
,2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011
,2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers, Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877
,2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130
,2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
,2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728
,2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386
,2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
,2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109
,2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906
,2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434
,2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
,2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics (Switzerland), 9, http://dx.doi.org/10.3390/electronics9071177
,2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems
,2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
,2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862
,2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
,2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
,2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1
,2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
,2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808
,2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717
,2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050
,2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
,2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
,2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
,2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
,2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
,2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
,2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002
,2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430
,2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis, http://arxiv.org/abs/1711.02824v1
,