Follow

Submissions from 2021

Link

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of health things, Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, and Paul Haskell-Dowland

PDF

Frequency estimation from compressed measurements of a sinusoid in moving‐average colored noise, Nuha A. S. Alwan and Zahir M. Hussain

PDF

Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, and Al-Sakib K. Pathan

Link

Cultural regulation of disruptive technologies: Lessons from orthodox religious communities, Tracey Dowdeswell and Nachshon (Sean) Goltz

Link

Oriented to human autonomy Indian ethics, artificial intelligence, and driverless vehicles, Robert Geraci and Nachshon (Sean) Goltz

Link

A fuzzy supply chain risk assessment approach using real-time disruption event data from Twitter, Naeem K. Janjua, Falak Nawaz, and Daniel D. Prior

Link

A genetic programming framework for novel behaviour discovery in air combat scenarios, Martin Masek, Chiou Peng Lam, Luke Kelly, Lyndon Benke, and Michael Papasimeon

PDF

Discovering optimal strategy in tactical combat scenarios through the evolution of behaviour trees, Martin Masek, Chiou Peng Lam, Luke Kelly, and Martin Wong

Link

Can i trust you? incorporating supplier trustworthiness into supplier selection criteria, Daniel D. Prior, Morteza Saberi, Naeem Khalid Janjua, and Ferry Jie

PDF

A secured message transmission protocol for vehicular ad hoc networks, A. F. M. Suaib Akhter, A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin

Link

Machine learning based cyber-security defense at the age of industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Link

Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Submissions from 2020

Link

Deep learning: Hope or hype, Mohiuddin Ahmed and A. K. M. Najmul Islam

Link

Blockchain: Can it be trusted?, Mohiuddin Ahmed and Al-Sakib Khan Pathan

PDF

False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure, Mohiuddin Ahmed and Al-Sakib Khan Pathan

Link

Advances in artificial intelligence (AI) for more effective decision making in agriculture, Leisa Armstrong, N. Gandhi, P. Taechatanasat, and Dean Diepeveen

PDF

The clash of empires: Regulating technological threats to civil society, Tracey Leigh Dowdeswell and Nachshon Goltz

PDF

From the tree of knowledge and the golem of Prague to kosher autonomous cars: The ethics of artificial intelligence through jewish eyes, Nachshon Goltz, John Zeleznikow, and Tracey Dowdeswell

Link

A progressive weighted average weight optimisation ensemble technique for fruit and vegetable classification, Khurram Hameed, Douglas Chai, and Alexander Rassau

PDF

Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, and Arafat Al-Dhaqm

PDF

Performances of the LBP based algorithm over CNN models for detecting crops and weeds with similar morphologies, Vi Nguyen Thanh Le, Selam Ahderom, and Kamal Alameh

PDF

SAM-SoS: A stochastic software architecture modeling and verification approach for complex System-of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, and Muhammad Ali Babar

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

Link

Dynamic QoS-aware cloud service selection using best-worst method and timeslot weighted satisfaction scores, Falak Nawaz and Naeem K. Janjua

PDF

Quantifiable isovist and graph-based measures for automatic evaluation of different area types in virtual terrain generation, Andrew Pech, Chiou Peng Lam, and Martin Masek

Link

Making the Information Technology (IT) business alignment works: a framework of IT-based competitive strategy, Ira Puspitasari and Ferry Jie

PDF

A novel penalty-based wrapper objective function for feature selection in big data using cooperative co-evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

PDF

Cooperative co-evolution for feature selection in big data with random feature grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland

Link

Vision to language: Methods, metrics and datasets, Naeha Sharif, Uzair Nadeem, Syed A. A. Shah, Mohammed Bennamoun, and Wei Liu

Link

Data science in cybersecurity and cyberthreat intelligence, Leslie F. Sikos and Kim-Kwang Raymond Choo

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp