Browse by Aston Author

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | Date | No Grouping
Number of items: 31.

Article

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy-import hashing: A static analysis technique for malware detection. Forensic Science International: Digital Investigation, 37 ,

Naik, Kshirasagar, Pandit, Tejas, Naik, Nitin and Shah, Parth (2021). Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging. Sensors, 21 (3), pp. 1-37.

Albasir, Abdurhman, Hu, Qicheng, Naik, Kshirasagar and Naik, Nitin (2021). Unsupervised detection of security threats in cyberphysical system and IoT devices based on power fingerprints and RBM autoencoders. Journal of Surveillance, Security and Safety, 2 (1), pp. 1-25.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Kshirasagar and Song, Jingping (2020). Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis. Complex & Intelligent Systems ,

Naik, Nitin, Jenkins, Paul, Savage, Nick and Yang, Longzhi (2020). A computational intelligence enabled honeypot for chasing ghosts in the wires. Complex & Intelligent Systems ,

Naik, Nitin, Shang, Changjing, Jenkins, Paul and Shen, Qiang (2020). D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. IEEE Transactions on Emerging Topics in Computational Intelligence ,

Song, Jingping, Meng, Qingyu, Luo, Chenke, Naik, Nitin and Xu, Jian (2020). An immunization scheme for ransomware. Computers, Materials and Continua, 64 (2), pp. 1051-1061.

Naik, Nitin, Diao, Ren and Shen, Qiang (2017). Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Transactions on Fuzzy Systems, 26 (4), pp. 1878-1892.

Book Section

Naik, Nitin and Jenkins, Paul (2021). Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity. IN: Proceedings of 2020 7th IEEE International Conference on Behavioural and Social Computing, BESC 2020. GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Cooke, Roger, Gillett, Jonathan and Jin, Yaochu (2021). Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar, Song, Jingping, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.

Naik, Nitin and Jenkins, Paul (2020). Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.

Naik, Nitin and Jenkins, Paul (2020). uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2020). Fuzzy-import hashing:A malware analysis approach. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.

Naik, Nitin and Jenkins, Paul (2020). Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. IN: Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020. Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020 . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Augmented YARA Rules Fused with Fuzzy Hashing in Ransomware Triaging. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.

Naik, Nitin, Jenkins, Paul, Gillett, Jonathan, Mouratidis, Haralambos, Naik, Kshirasagar and Song, Jingping (2020). Lockout-Tagout Ransomware:A Detection Method for Ransomware using Fuzzy Hashing and Clustering. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.

Naik, Nitin and Shen, Qiang (2019). Integration of Interpolation and Inference with Multi-antecedent Rules. IN: Advances in Computational Intelligence Systems - Contributions Presented at the 19th UK Workshop on Computational Intelligence, 2019. Advances in Intelligent Systems and Computing . GBR: Springer.

Naik, Nitin (2018). LPWAN technologies for IoT systems: choice between ultra narrow band and spread spectrum. IN: 2018 IEEE International Systems Engineering Symposium (ISSE). ITA: IEEE.

Naik, Nitin (2017). Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.

Naik, Nitin (2017). Docker container-based big data processing system in multiple clouds for everyone. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.

Naik, Nitin, Jenkins, Paul and Newell, David (2017). Choice of suitable Identity and Access Management standards for mobile computing and communication. IN: Proceedings of the 24th International Conference on Telecommunications. Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017 . CYP: IEEE.

Naik, Nitin and Jenkins, Paul (2017). Securing digital identities in the cloud by selecting an apposite federated identity management from SAML, OAuth and OpenID Connect. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.

Naik, Nitin (2017). Software CROWD-Sourcing. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Davies, Philip and Newell, David (2017). Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. IN: 2016 IEEE International Conference on Computer and Information Technology (CIT). FJI: IEEE.

Naik, Nitin (2016). Flooded streets — A crowdsourced sensing system for disaster response: A case study. IN: 2016 IEEE International Symposium on Systems Engineering (ISSE). GBR: IEEE.

Naik, Nitin and Jenkins, Paul (2016). An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. IN: Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (DASC). Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC . NZL: IEEE.

Naik, Nitin and Jenkins, Paul (2016). Web Protocols and Challenges of Web Latency in the Web of Things. IN: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN). 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) . AUT: IEEE.

Naik, Nitin and Jenkins, Paul (2016). A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. IN: 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). GBR: IEEE.

Naik, Nitin (2016). Crowdsourcing, Open-sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis. IN: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). GBR: IEEE.

This list was generated on Tue Sep 28 02:30:06 2021 BST.