Browse by Aston Author

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | Date | No Grouping
Number of items: 19.

Article

Chen, Wenjun, Farag, Saber, Butt, Usman and Al-Khateeb, Haider (2024). Leveraging Machine Learning for Sophisticated Rental Value Predictions: A Case Study from Munich, Germany. Applied Sciences, 14 (20),

Butt, Usman javed, Hussien, Osama, Hasanaj, Krison, Shaalan, Khaled, Hassan, Bilal and Al-Khateeb, Haider (2023). Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks. Algorithms, 16 (12),

Johnphill, Obinna, Sadiq, Ali, Al-Obeidat, Feras, Al-Khateeb, Haider, Taheir, Mohammed, Kaiwartya, Omprakash and Ali, Mohammed (2023). Self-Healing in Cyber–Physical Systems Using Machine Learning:A Critical Analysis of Theories and Tools. Future Internet, 15 (7),

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Makonese, Tanaka Laura, Benson, Vladlena, Khan, Samiya and Butt, Usman Javed (2023). Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants. International Journal of Electronic Security and Digital Forensics , (In Press)

Asante, Mary, Epiphaniou, Gregory, Maple, Carsten, Al-Khateeb, Haider, Bottarelli, Mirko and Ghafoor, Kayhan Zrar (2023). Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey. IEEE Transactions on Engineering Management, 70 (2), pp. 713-739.

Bold, Robert, Al-Khateeb, Haider and Ersotelos, Nikolaos (2022). Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms. Applied Sciences, 12 (24),

Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). Pivot Attack Classification for Cyber Threat Intelligence. Journal of Information Security and Cybercrimes Research, 5 (2), pp. 91-103.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Aggoun, Amar (2022). Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems. IEEE Internet of Things Journal, 9 (15), pp. 13279-13297.

Marques, Rafael Salema, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2022). APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based On Statistical Pattern Recognition. IEEE Transactions on Information Forensics and Security, 17 , pp. 700-715.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Maple, Carsten, Epiphaniou, Gregory, Hammoudeh, Mohammad, Jahankhani, Hamid and Pillai, Prashant (2021). Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Computers and Electrical Engineering, 91 ,

Ersotelos, Nikolaos, Bottarelli, Mirko, Al-Khateeb, Haider, Epiphaniou, Gregory, Alhaboby, Zhraa A., Pillai, Prashant and Aggoun, Amar (2020). Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks, 10 (1),

Epiphaniou, Gregory, Pillai, Prashant, Bottarelli, Mirko, Al-Khateeb, Haider, Hammoudesh, Mohammad and Maple, Carsten (2020). Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management, 67 (4), 1059 - 1073.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2020). Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities, 3 (3), pp. 894-927.

Walshe, Marcus, Epiphaniou, Gregory, Al-Khateeb, Haider, Hammoudeh, Mohammed, Katos, Vasilios and Dehghantanha, Ali (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95 ,

Mackintosh, Mike, Epiphaniou, Gregory, Al-Khateeb, Haider, Burnham, Keith, Pillai, Prashant and Hammoudeh, Mohammad (2019). Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. Journal of Sensor and Actuator Networks, 8 (1),

Bottarelli, Mirko, Epiphaniou, Gregory, Ismail, Dhouha Kbaier Ben, Karadimas, Petros and Al-Khateeb, Haider (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers & Security, 78 , pp. 454-476.

Frommholz, Ingo, Al-Khateeb, Haider, Potthast, Martin, Ghasem, Zinnar, Shukla, Mitul and Short, Emma (2016). On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank-Spektrum, 16 , 127–135.

Book Section

Adamyk, Oksana, Benson, Vladlena, Adamyk, Bogdan, Al-Khateeb, Haider and Chinnaswamy, Anitha (2023). Does Artificial Intelligence Help Reduce Audit Risks? IN: 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings. 2023 13th International Conference on Advanced Computer Information Technologies, ACIT 2023 - Proceedings . POL: IEEE.

Lee, Geraldine, Epiphaniou, Gregory, Al-Khateeb, Haider and Maple, Carsten (2018). Security and privacy of things:Regulatory challenges and gaps for the secure integration of cyber-physical systems. IN: Third International Congress on Information and Communication Technology. Yang, Xin-She; Sherratt, imon; Dey, Nilanjan and Joshi, Amit (eds) Advances in Intelligent Systems and Computing (1). Springer Singapore.

This list was generated on Wed Nov 20 03:50:29 2024 GMT.