Select Publications
Journal articles
2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
,2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109
,2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906
,2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434
,2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
,2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics (Switzerland), 9, http://dx.doi.org/10.3390/electronics9071177
,2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems
,2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
,2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862
,2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
,2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
,2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1
,2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
,2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808
,2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717
,2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050
,2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
,2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
,2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
,2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
,2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
,2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
,2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002
,2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430
,2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', , http://arxiv.org/abs/1711.02824v1
,2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166
,2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974
,Conference Papers
2024, 'A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge', in Proceedings - International Conference on Data Engineering, pp. 1520 - 1532, http://dx.doi.org/10.1109/ICDE60146.2024.00125
,2023, 'An Explainable Intrusion Discovery Framework for Assessing Cyber Resilience in the Internet of Things Networks', in Proceedings of the Future Technologies Conference (FTC) 2023, Springer Nature, Vancouver, BC, Canada, pp. 199 - 215, presented at Future Technologies Conference (FTC) 2023, Vancouver, BC, Canada, 19 October 2023, http://dx.doi.org/10.1007/978-3-031-47448-4_15
,2023, 'Digital Forensics based on Federated Learning in IoT Environment', in ACM International Conference Proceeding Series, pp. 92 - 101, http://dx.doi.org/10.1145/3579375.3579387
,2022, 'Towards Generalized Deepfake Detection With Continual Learning On Limited New Data', in 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 1 - 7, presented at 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 November 2022 - 02 December 2022, http://dx.doi.org/10.1109/dicta56598.2022.10034569
,2022, 'Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798196
,2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, pp. 887 - 894, http://dx.doi.org/10.1109/TrustCom53373.2021.00125
,2021, 'Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 829 - 840, http://dx.doi.org/10.1109/QRS54544.2021.00092
,2021, 'Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques', in Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW, pp. 46 - 52, http://dx.doi.org/10.1109/EDOCW52865.2021.00031
,2021, 'NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 117 - 135, http://dx.doi.org/10.1007/978-3-030-72802-1_9
,2020, 'Data Analytics-enabled Intrusion Detection: Evaluations of Linux ToN_IoT Datasets', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 727 - 735, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00100
,2020, 'Densely Connected Residual Network for Attack Recognition', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 233 - 242, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00042
,2020, 'Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 848 - 855, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00114
,2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
,2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
,2020, 'Enhancing IoT Anomaly Detection Performance for Federated Learning', IEEE, Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020 - 19 December 2020, http://dx.doi.org/10.1109/MSN50589.2020.00045
,2020, 'Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things', Fiji- Virtual Conference, presented at IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji- Virtual Conference, 14 December 2020 - 16 December 2020
,2020, 'A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models', Canberra, Australia, presented at The 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 04 December 2020
,2020, 'Autonomous detection of malicious events using machine learning models in drone networks', in DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, pp. 61 - 66, http://dx.doi.org/10.1145/3414045.3415951
,2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
,2020, 'A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing', Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 03 September 2020 - 04 March 2020
,2020, 'A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals', in IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, IEEE, Glasgow, United kingdom, presented at IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, Glasgow, United kingdom, 19 July 2020 - 24 July 2020
,