default search action
Naghmeh Moradpoor Sheykhkanloo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Vijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski:
Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. ARES 2024: 48:1-48:6 - [c18]Md Shahed Islam Noyon, Naghmeh Moradpoor, Leandros Maglaras, Jawad Ahmad:
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. DCOSS-IoT 2024: 516-523 - [c17]Olanrewaju Mueez Adesanya, Naghmeh Moradpoor, Leandros Maglaras, Ik Soo Lim, Mohamed Amine Ferrag:
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. DCOSS-IoT 2024: 556-563 - [i7]Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk:
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems. CoRR abs/2403.17571 (2024) - [i6]Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke:
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities. CoRR abs/2405.04874 (2024) - [i5]Hamish Alsop, Douglas Alsop, Joseph Solomon, Liam Aumento, Mark Butters, Cameron Millar, Yagmur Yigit, Leandros Maglaras, Naghmeh Moradpoor:
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality. CoRR abs/2409.04457 (2024) - [i4]Amanda Thomson, Leandros Maglaras, Naghmeh Moradpoor:
A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping. CoRR abs/2410.03817 (2024) - 2023
- [c16]Andrew Thaeler, Yagmur Yigit, Leandros Maglaras, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell:
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. CAMAD 2023: 170-175 - [c15]Naghmeh Moradpoor, Leandros Maglaras, Ezra Abah, Andres Robles-Durazno:
The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. DCOSS-IoT 2023: 453-460 - [c14]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. SEEDA-CECNSM 2023: 1-6 - [c13]Stanislava Ivanova, Naghmeh Moradpoor:
Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments? WFCS 2023: 1-4 - [i3]Vassilis Papaspirou, Leandros Maglaras, Ioanna Kantzavelou, Naghmeh Moradpoor, Sokratis K. Katsikas:
A Blockchain-based two Factor Honeytoken Authentication System. CoRR abs/2307.05047 (2023) - [i2]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. CoRR abs/2311.12849 (2023) - 2022
- [c12]Naghmeh Moradpoor, Masoud Barati, Andres Robles-Durazno, Ezra Abah, James McWhinnie:
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain. Cyber Science 2022: 437-451 - 2021
- [j7]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, Zhiyuan Tan:
Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system. Ad Hoc Networks 120: 102590 (2021) - [j6]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, Jorge Porcel-Bustamante:
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry 13(3): 519 (2021) - [c11]Owen Cutajar, Naghmeh Moradpoor, Zakwan Jaroucheh:
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. SIN 2021: 1-4 - [c10]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Jorge Porcel-Bustamante:
VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems. SIN 2021: 1-7 - [e3]Naghmeh Moradpoor, Atilla Elçi, Andrei Petrovski:
14th International Conference on Security of Information and Networks, SIN 2021, Edinburgh, United Kingdom, December 15-17, 2021. IEEE 2021, ISBN 978-1-7281-9266-6 [contents] - 2020
- [j5]Naghmeh Moradpoor Sheykhkanloo, Adam J. Hall:
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. Int. J. Cyber Warf. Terror. 10(2): 1-26 (2020) - [j4]John Foley, Naghmeh Moradpoor, Henry Ochenyi:
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset. Secur. Commun. Networks 2020: 2804291:1-2804291:17 (2020) - [c9]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [j3]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, Inaki Maneru-Marin:
PLC memory attack detection and response in a clean water supply system. Int. J. Crit. Infrastructure Prot. 26 (2019) - [c8]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*. ICCA 2019: 724-731 - [i1]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. CoRR abs/1907.10272 (2019) - 2018
- [c7]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. IEEE BigData 2018: 5034-5039 - [c6]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Cyber Security 2018: 1-8 - [c5]Felisberto Semedo, Naghmeh Moradpoor, Majid Rafiq:
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. SIN 2018: 1:1-1:6 - [e2]Philipp Reinecke, Naghmeh Moradpoor, George Theodorakopoulos:
Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018. ACM 2018, ISBN 978-1-4503-6608-3 [contents] - 2017
- [j2]Naghmeh Moradpoor Sheykhkanloo:
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. Int. J. Cyber Warf. Terror. 7(2): 16-41 (2017) - [c4]Naghmeh Moradpoor, Martyn Brown, Gordon Russell:
Insider threat detection using principal component analysis and self-organising map. SIN 2017: 274-279 - [e1]Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama:
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. ACM 2017 [contents] - 2015
- [c3]Naghmeh Moradpoor Sheykhkanloo:
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. SIN 2015: 258-266 - 2014
- [c2]Naghmeh Moradpoor Sheykhkanloo:
Employing Neural Networks for the Detection of SQL Injection Attack. SIN 2014: 318 - 2013
- [j1]Naghmeh Moradpoor, Gerard P. Parr, Sally I. McClean, Bryan W. Scotney:
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks. Opt. Switch. Netw. 10(4): 439-457 (2013) - 2012
- [b1]Naghmeh Moradpoor Sheykhkanloo:
Optimisation analytics for bandwidth resource management in converted IP networks. Ulster University, UK, 2012 - 2011
- [c1]Naghmeh Moradpoor, Gerard P. Parr, Sally I. McClean, Bryan W. Scotney, Gilbert Owusu:
Hybrid optical and wireless technology integrations for next generation broadband access networks. Integrated Network Management 2011: 1013-1020
Coauthor Index
aka: Leandros A. Maglaras
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint