Browse by Aston Author

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | Date | No Grouping
Jump to: 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2016
Number of items: 20.

2025

Ahmadi‐Assalemi, Gabriela, Al‐Khateeb, Haider, Benson, Vladlena, Adamyk, Bogdan and Ammi, Meryem (2025). Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems. IET Cyber-Physical Systems: Theory & Applications, 10 (1),

2024

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Makonese, Tanaka Laura, Benson, Vladlena, Khan, Samiya and Butt, Usman Javed (2024). Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants. International Journal of Electronic Security and Digital Forensics ,

Chen, Wenjun, Farag, Saber, Butt, Usman and Al-Khateeb, Haider (2024). Leveraging Machine Learning for Sophisticated Rental Value Predictions: A Case Study from Munich, Germany. Applied Sciences, 14 (20),

2023

Butt, Usman javed, Hussien, Osama, Hasanaj, Krison, Shaalan, Khaled, Hassan, Bilal and Al-Khateeb, Haider (2023). Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks. Algorithms, 16 (12),

Adamyk, Oksana, Benson, Vladlena, Adamyk, Bogdan, Al-Khateeb, Haider and Chinnaswamy, Anitha (2023). Does Artificial Intelligence Help Reduce Audit Risks? IN: 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings. 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings . POL: IEEE.

Johnphill, Obinna, Sadiq, Ali, Al-Obeidat, Feras, Al-Khateeb, Haider, Taheir, Mohammed, Kaiwartya, Omprakash and Ali, Mohammed (2023). Self-Healing in Cyber–Physical Systems Using Machine Learning:A Critical Analysis of Theories and Tools. Future Internet, 15 (7),

Asante, Mary, Epiphaniou, Gregory, Maple, Carsten, Al-Khateeb, Haider, Bottarelli, Mirko and Ghafoor, Kayhan Zrar (2023). Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey. IEEE Transactions on Engineering Management, 70 (2), pp. 713-739.

2022

Bold, Robert, Al-Khateeb, Haider and Ersotelos, Nikolaos (2022). Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms. Applied Sciences, 12 (24),

Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). Pivot Attack Classification for Cyber Threat Intelligence. Journal of Information Security and Cybercrimes Research, 5 (2), pp. 91-103.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Aggoun, Amar (2022). Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems. IEEE Internet of Things Journal, 9 (15), pp. 13279-13297.

Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based On Statistical Pattern Recognition. IEEE Transactions on Information Forensics and Security, 17 , pp. 700-715.

2021

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Maple, Carsten, Epiphaniou, Gregory, Hammoudeh, Mohammad, Jahankhani, Hamid and Pillai, Prashant (2021). Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Computers and Electrical Engineering, 91 ,

2020

Ersotelos, Nikolaos, Bottarelli, Mirko, Al-Khateeb, Haider, Epiphaniou, Gregory, Alhaboby, Zhraa A., Pillai, Prashant and Aggoun, Amar (2020). Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks, 10 (1),

Epiphaniou, Gregory, Pillai, Prashant, Bottarelli, Mirko, Al-Khateeb, Haider, Hammoudesh, Mohammad and Maple, Carsten (2020). Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management, 67 (4), 1059 - 1073.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2020). Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities, 3 (3), pp. 894-927.

2019

Walshe, Marcus, Epiphaniou, Gregory, Al-Khateeb, Haider, Hammoudeh, Mohammed, Katos, Vasilios and Dehghantanha, Ali (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95 ,

Mackintosh, Mike, Epiphaniou, Gregory, Al-Khateeb, Haider, Burnham, Keith, Pillai, Prashant and Hammoudeh, Mohammad (2019). Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. Journal of Sensor and Actuator Networks, 8 (1),

2018

Lee, Geraldine, Epiphaniou, Gregory, Al-Khateeb, Haider and Maple, Carsten (2018). Security and privacy of things:Regulatory challenges and gaps for the secure integration of cyber-physical systems. IN: Third International Congress on Information and Communication Technology. Yang, Xin-She; Sherratt, imon; Dey, Nilanjan and Joshi, Amit (eds) Advances in Intelligent Systems and Computing (1). Springer Singapore.

Bottarelli, Mirko, Epiphaniou, Gregory, Ismail, Dhouha Kbaier Ben, Karadimas, Petros and Al-Khateeb, Haider (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers & Security, 78 , pp. 454-476.

2016

Frommholz, Ingo, Al-Khateeb, Haider, Potthast, Martin, Ghasem, Zinnar, Shukla, Mitul and Short, Emma (2016). On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank-Spektrum, 16 , 127–135.

This list was generated on Mon Mar 31 01:48:38 2025 BST.