Publications

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All

Ransomware detection and family classification using fine-tuned BERT and RoBERTa models

Egyptian Informatics Journal | Vol. 30 | Issue 100654 | 2025

DOI: https://doi.org/10.1016/j.eij.2025.100645

Surface defect detection on bolt surface using a real-time fine-tuned YOLOv6 model

Journal of Big Data | Vol. 12 | Issue 184 | 2025

DOI: https://doi.org/10.1186/s40537-025-01226-2

Advanced social media crime prevention via deep learning and cryptographic data encryption

The Computer Journal | Vol. 1 | Issue 2025 | 2025

DOI: https://doi.org/10.1093/comjnl/bxaf028

Enhancing Intrusion Detection System Evaluation: A Framework for Generating Comprehensive and Scalable Datasets

SSRG International Journal of Electronics and Communication Engineering | Vol. 11 | Issue 10 | 2024

DOI: https://doi.org/10.14445/23488549/IJECE-V11I10P107

Computational challenges and solutions: Prime number generation for enhanced data security

PLOS ONE | 2024

DOI: https://doi.org/10.1371/journal.pone.0311782

Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism

Heliyon | Vol. 10 | 2024

DOI: https://doi.org/10.1016/j.heliyon.2024.e37577

Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes

Peer-to-Peer Networking and Applications | Vol. 17 | Issue 3856–3882 | 2024

DOI: https://doi.org/10.1007/s12083-024-01786-9

Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments

Applied Artificial Intelligence An International Journal | Vol. 38 | Issue 1 | 2024

DOI: https://doi.org/10.1080/08839514.2024.2381882

Evaluating Ensemble Learning Mechanisms for Predicting Advanced Cyber Attacks

Applied Sciences | 2023

DOI: https://doi.org/10.3390/app132413310

Collaborative Federated Learning-Based Model for Alert Correlation and Attack Scenario Recognition

Electronics | 2023

DOI: https://doi.org/10.3390/electronics12214509

Knowledge-Based Model to Represent Security Information and Reason About Multi-stage Attacks

International Conference on Advanced Information Systems Engineering CAiSE , Lecture Notes in Business Information Processing, vol 215, 978-3-319-19243-7 | 2015

DOI: https://doi.org/10.1007/978-3-319-19243-7_44