Select Publications
Conference Papers
2024, 'A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge', in Proceedings - International Conference on Data Engineering, pp. 1520 - 1532, http://dx.doi.org/10.1109/ICDE60146.2024.00125
,2023, 'An Explainable Intrusion Discovery Framework for Assessing Cyber Resilience in the Internet of Things Networks', in Proceedings of the Future Technologies Conference (FTC) 2023, Springer Nature, Vancouver, BC, Canada, pp. 199 - 215, presented at Future Technologies Conference (FTC) 2023, Vancouver, BC, Canada, 19 October 2023, http://dx.doi.org/10.1007/978-3-031-47448-4_15
,2023, 'Digital Forensics based on Federated Learning in IoT Environment', in ACM International Conference Proceeding Series, pp. 92 - 101, http://dx.doi.org/10.1145/3579375.3579387
,2022, 'Towards Generalized Deepfake Detection With Continual Learning On Limited New Data', in 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 1 - 7, presented at 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 November 2022 - 02 December 2022, http://dx.doi.org/10.1109/dicta56598.2022.10034569
,2022, 'Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798196
,2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, pp. 887 - 894, http://dx.doi.org/10.1109/TrustCom53373.2021.00125
,2021, 'Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 829 - 840, http://dx.doi.org/10.1109/QRS54544.2021.00092
,2021, 'Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques', in Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW, pp. 46 - 52, http://dx.doi.org/10.1109/EDOCW52865.2021.00031
,2021, 'NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 117 - 135, http://dx.doi.org/10.1007/978-3-030-72802-1_9
,2020, 'Data Analytics-enabled Intrusion Detection: Evaluations of Linux ToN_IoT Datasets', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 727 - 735, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00100
,2020, 'Densely Connected Residual Network for Attack Recognition', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 233 - 242, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00042
,2020, 'Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 848 - 855, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00114
,2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
,2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
,2020, 'Enhancing IoT Anomaly Detection Performance for Federated Learning', IEEE, Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020 - 19 December 2020, http://dx.doi.org/10.1109/MSN50589.2020.00045
,2020, 'Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things', Fiji- Virtual Conference, presented at IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji- Virtual Conference, 14 December 2020 - 16 December 2020
,2020, 'A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models', Canberra, Australia, presented at The 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 04 December 2020
,2020, 'Autonomous detection of malicious events using machine learning models in drone networks', in DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, pp. 61 - 66, http://dx.doi.org/10.1145/3414045.3415951
,2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
,2020, 'A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing', Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 03 September 2020 - 04 March 2020
,2020, 'A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals', in IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, IEEE, Glasgow, United kingdom, presented at IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, Glasgow, United kingdom, 19 July 2020 - 24 July 2020
,2020, 'Pelican: A Deep Residual Network for Network Intrusion Detection', in Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, pp. 55 - 62, http://dx.doi.org/10.1109/DSN-W50199.2020.00018
,2020, 'Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework', Sydney, Australia, presented at 7th International Conference on Security and its Applications (CNSA 2020), Sydney, Australia, 28 March 2020 - 29 March 2020
,2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
,2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', Bellevue, Washington, USA, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023
,2018, 'Cyber intrusion detection in operations of bulk handling ports', in Josang A (ed.), European Conference on Information Warfare and Security, ECCWS, Academic Conferences and Publishing International Limited, Oslo, Norway, pp. 307 - 316, presented at 17th European Conference on Cyber Warfare and Security ECCWS 2018, Oslo, Norway, 28 June 2018 - 29 June 2018, http://dx.doi.org/10.26190/unsworks/27235
,2018, 'A Digital Identity Stack to Improve Privacy in the IoT', in IEEE 4th World Forum on Internet of Things, IEEE, Singapore, pp. 25 - 29, presented at IEEE 4th World Forum on Internet of Things, Singapore, 05 February 2018 - 08 February 2018, http://dx.doi.org/10.1109/WF-IoT.2018.8355199
,2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.), School of Computer Engineering, KIIT University, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
,2017, 'Flow Aggregator Module for Analysing Network Traffic', in Das HD (ed.), International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
,2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812
,2017, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Hu J; Khalil I; Tari Z; Wen S (eds.), Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28
,2017, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', Springer International Publishing, Melbourne, Australia, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/towards-developing-network-forensic-mechanism-for-botnet-activit/15746852
,2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', Canberra, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017
,2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', Canberra, Australia, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017
,2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, http://dx.doi.org/10.1109/MilCIS.2015.7348942
,2015, 'A hybrid feature selection for network intrusion detection systems: Central points', in Security Research Institute, Edith Cowan University, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57a84d4fbefbb
,2015, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 November 2015 - 05 November 2015, http://dx.doi.org/10.13140/RG.2.1.2264.4883
,2015, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, Kyoto, Japan, pp. 25 - 31, presented at 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan, 05 November 2015 - 05 November 2015, http://ieeexplore.ieee.org/document/7809531/
,2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212
,