Your selections:
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Kaisar, Shahriar
Continuous patient monitoring with a patient centric agent : A block architecture
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Complex anomaly for enhanced machine independent condition monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Carry me if you can : A utility based forwarding scheme for content sharing in tourist destinations
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Generative malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Zhang, Leo
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
State estimation in the presence of cyber attacks using distributed partition technique
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzuman, Joarder, Islam, Syed
False data detection in a clustered smart grid using unscented Kalman filter
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
Cyber resilience modelling for the operations of hybrid network
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Vulnerability assessment framework for a smart grid
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
Fuzzy-based operational resilience modelling
- Ur-Rehman, Attiq, Kamruzzuman, Joarder, Gondal, Iqbal, Jolfaei, Alireza
Are you sure you would like to clear your session, including search history and login status?