Browse by Aston Author

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | Date | No Grouping
Number of items: 34.

Article

Pimsarn, Chutipon, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Nitin and Yang, Longzhi (2022). Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem. Complex & Intelligent Systems ,

Naik, Nitin, Shang, Changjing, Jenkins, Paul and Shen, Qiang (2021). D-FRI-Honeypot:A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. IEEE Transactions on Emerging Topics in Computational Intelligence, 5 (6), pp. 893-907.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy-import hashing: A static analysis technique for malware detection. Forensic Science International: Digital Investigation, 37 ,

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Kshirasagar and Song, Jingping (2021). Embedded YARA rules:strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis. Complex & Intelligent Systems, 7 , 687–702.

Naik, Kshirasagar, Pandit, Tejas, Naik, Nitin and Shah, Parth (2021). Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging. Sensors, 21 (3), pp. 1-37.

Naik, Nitin, Jenkins, Paul, Savage, Nick and Yang, Longzhi (2021). A computational intelligence enabled honeypot for chasing ghosts in the wires. Complex & Intelligent Systems, 7 , 477–494.

Albasir, Abdurhman, Hu, Qicheng, Naik, Kshirasagar and Naik, Nitin (2021). Unsupervised detection of security threats in cyberphysical system and IoT devices based on power fingerprints and RBM autoencoders. Journal of Surveillance, Security and Safety, 2 (1), pp. 1-25.

Song, Jingping, Meng, Qingyu, Luo, Chenke, Naik, Nitin and Xu, Jian (2020). An immunization scheme for ransomware. Computers, Materials and Continua, 64 (2), pp. 1051-1061.

Naik, Nitin, Diao, Ren and Shen, Qiang (2017). Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Transactions on Fuzzy Systems, 26 (4), pp. 1878-1892.

Naik, Nitin, Grace, Paul, Jenkins, Paul, Naik, Kshirasagar and Song, Jingping (2022). An Evaluation of Potential Attack Surfaces Based on Attack Tree Modelling and Risk Matrix Applied to Self-Sovereign Identity. Computers & Security, 120 ,

Zhou, Mou, Shang, Changjing, Li, Guobin, Shen, Liang, Naik, Nitin, Jin, Shangzhu, Peng, Jun and Shen, Qiang (2022). Transformation-Based Fuzzy Rule Interpolation With Mahalanobis Distance Measures Supported by Choquet Integral. IEEE Transactions on Fuzzy Systems ,

Book Section

Naik, Nitin and Jenkins, Paul (2021). Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity. IN: Proceedings of 2020 7th IEEE International Conference on Behavioural and Social Computing, BESC 2020. GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Cooke, Roger, Gillett, Jonathan and Jin, Yaochu (2021). Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar, Song, Jingping, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.

Naik, Nitin and Jenkins, Paul (2020). Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.

Naik, Nitin and Jenkins, Paul (2020). uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2020). Fuzzy-import hashing:A malware analysis approach. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.

Naik, Nitin and Jenkins, Paul (2020). Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. IN: Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020. Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020 . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Augmented YARA Rules Fused with Fuzzy Hashing in Ransomware Triaging. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.

Naik, Nitin, Jenkins, Paul, Gillett, Jonathan, Mouratidis, Haralambos, Naik, Kshirasagar and Song, Jingping (2020). Lockout-Tagout Ransomware:A Detection Method for Ransomware using Fuzzy Hashing and Clustering. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.

Naik, Nitin and Shen, Qiang (2019). Integration of Interpolation and Inference with Multi-antecedent Rules. IN: Advances in Computational Intelligence Systems - Contributions Presented at the 19th UK Workshop on Computational Intelligence, 2019. Advances in Intelligent Systems and Computing . GBR: Springer.

Naik, Nitin (2018). LPWAN technologies for IoT systems: choice between ultra narrow band and spread spectrum. IN: 2018 IEEE International Systems Engineering Symposium (ISSE). ITA: IEEE.

Naik, Nitin (2017). Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.

Naik, Nitin (2017). Docker container-based big data processing system in multiple clouds for everyone. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.

Naik, Nitin, Jenkins, Paul and Newell, David (2017). Choice of suitable Identity and Access Management standards for mobile computing and communication. IN: Proceedings of the 24th International Conference on Telecommunications. Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017 . CYP: IEEE.

Naik, Nitin and Jenkins, Paul (2017). Securing digital identities in the cloud by selecting an apposite federated identity management from SAML, OAuth and OpenID Connect. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.

Naik, Nitin (2017). Software CROWD-Sourcing. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.

Naik, Nitin, Jenkins, Paul, Davies, Philip and Newell, David (2017). Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. IN: 2016 IEEE International Conference on Computer and Information Technology (CIT). FJI: IEEE.

Naik, Nitin (2016). Flooded streets — A crowdsourced sensing system for disaster response: A case study. IN: 2016 IEEE International Symposium on Systems Engineering (ISSE). GBR: IEEE.

Naik, Nitin and Jenkins, Paul (2016). An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. IN: Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (DASC). Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC . NZL: IEEE.

Naik, Nitin and Jenkins, Paul (2016). Web Protocols and Challenges of Web Latency in the Web of Things. IN: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN). 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) . AUT: IEEE.

Naik, Nitin and Jenkins, Paul (2016). A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. IN: 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). GBR: IEEE.

Naik, Nitin (2016). Crowdsourcing, Open-sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis. IN: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). GBR: IEEE.

This list was generated on Sun Oct 2 02:41:24 2022 BST.