Browse by Aston Author

Ahmadi‐Assalemi, Gabriela, Al‐Khateeb, Haider, Benson, Vladlena, Adamyk, Bogdan and Ammi, Meryem (2025). Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems. IET Cyber-Physical Systems: Theory & Applications, 10 (1),
Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Makonese, Tanaka Laura, Benson, Vladlena, Khan, Samiya and Butt, Usman Javed (2024). Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants. International Journal of Electronic Security and Digital Forensics ,
Chen, Wenjun, Farag, Saber, Butt, Usman and Al-Khateeb, Haider (2024). Leveraging Machine Learning for Sophisticated Rental Value Predictions: A Case Study from Munich, Germany. Applied Sciences, 14 (20),
Butt, Usman javed, Hussien, Osama, Hasanaj, Krison, Shaalan, Khaled, Hassan, Bilal and Al-Khateeb, Haider (2023). Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks. Algorithms, 16 (12),
Adamyk, Oksana, Benson, Vladlena, Adamyk, Bogdan, Al-Khateeb, Haider and Chinnaswamy, Anitha (2023). Does Artificial Intelligence Help Reduce Audit Risks? IN: 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings. 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings . POL: IEEE.
Johnphill, Obinna, Sadiq, Ali, Al-Obeidat, Feras, Al-Khateeb, Haider, Taheir, Mohammed, Kaiwartya, Omprakash and Ali, Mohammed (2023). Self-Healing in Cyber–Physical Systems Using Machine Learning:A Critical Analysis of Theories and Tools. Future Internet, 15 (7),
Asante, Mary, Epiphaniou, Gregory, Maple, Carsten, Al-Khateeb, Haider, Bottarelli, Mirko and Ghafoor, Kayhan Zrar (2023). Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey. IEEE Transactions on Engineering Management, 70 (2), pp. 713-739.
Bold, Robert, Al-Khateeb, Haider and Ersotelos, Nikolaos (2022). Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms. Applied Sciences, 12 (24),
Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). Pivot Attack Classification for Cyber Threat Intelligence. Journal of Information Security and Cybercrimes Research, 5 (2), pp. 91-103.
Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Aggoun, Amar (2022). Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems. IEEE Internet of Things Journal, 9 (15), pp. 13279-13297.
Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based On Statistical Pattern Recognition. IEEE Transactions on Information Forensics and Security, 17 , pp. 700-715.
Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Maple, Carsten, Epiphaniou, Gregory, Hammoudeh, Mohammad, Jahankhani, Hamid and Pillai, Prashant (2021). Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Computers and Electrical Engineering, 91 ,
Ersotelos, Nikolaos, Bottarelli, Mirko, Al-Khateeb, Haider, Epiphaniou, Gregory, Alhaboby, Zhraa A., Pillai, Prashant and Aggoun, Amar (2020). Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks, 10 (1),
Epiphaniou, Gregory, Pillai, Prashant, Bottarelli, Mirko, Al-Khateeb, Haider, Hammoudesh, Mohammad and Maple, Carsten (2020). Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management, 67 (4), 1059 - 1073.
Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2020). Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities, 3 (3), pp. 894-927.
Walshe, Marcus, Epiphaniou, Gregory, Al-Khateeb, Haider, Hammoudeh, Mohammed, Katos, Vasilios and Dehghantanha, Ali (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95 ,
Mackintosh, Mike, Epiphaniou, Gregory, Al-Khateeb, Haider, Burnham, Keith, Pillai, Prashant and Hammoudeh, Mohammad (2019). Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. Journal of Sensor and Actuator Networks, 8 (1),
Lee, Geraldine, Epiphaniou, Gregory, Al-Khateeb, Haider and Maple, Carsten (2018). Security and privacy of things:Regulatory challenges and gaps for the secure integration of cyber-physical systems. IN: Third International Congress on Information and Communication Technology. Yang, Xin-She; Sherratt, imon; Dey, Nilanjan and Joshi, Amit (eds) Advances in Intelligent Systems and Computing (1). Springer Singapore.
Bottarelli, Mirko, Epiphaniou, Gregory, Ismail, Dhouha Kbaier Ben, Karadimas, Petros and Al-Khateeb, Haider (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers & Security, 78 , pp. 454-476.
Frommholz, Ingo, Al-Khateeb, Haider, Potthast, Martin, Ghasem, Zinnar, Shukla, Mitul and Short, Emma (2016). On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank-Spektrum, 16 , 127–135.