Currently viewing:
-
A systematic literature review of log-correlation tools for cyberattack detection and prediction in large networks
Chuah, E., Kalutarage, H., Tasdemir, K., Abrham, A., Maple, C.
Journal of Information Security and Applications, vol. 92, pp. 1 to 24
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.jisa.2025.104096
-
Deep learning-based prediction of reflection attacks using NetFlow data
Chuah, E., Jhumka, A., Ayesh, A.
Computers & Security, vol. 156, 104527
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.cose.2025.104527
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/25554/1/DL_based_prediction_reflection_attacks.pdf
-
http://aura.abdn.ac.uk/bitstream/2164/25554/2/Chuah_etal_CaS_Deep_Learning-Based_Prediction_AAM.pdf
-
An Unsupervised Malicious Web Request Detection based on Transformer and Contrastive Learning
He, S., Zhang, Y., Liang, D., Sharma, P.
IEEE Transactions on Network and Service Management
Contributions to Journals: Articles
-
Label-free Medical Image Quality Evaluation by Semantics-aware Contrastive Learning in IoMT
Yi, D., Hua, Y., Murchie, P., Sharma, P.
IEEE journal of biomedical and health informatics, vol. 29, no. 4, pp. 2335-2344
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/JBHI.2023.3340201
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/22588/1/Yi_etal_JBHI_Label-Free_Medical_Image_AAM.pdf
- Additional Links
-
View publication in Scopus
-
DECML: Distributed Edge Consensus Machine Learning Framework
Verdeyen, C., Shepherd, C., Markantonakis, K., Akram, R. N., Milroy, R., Abu Ghazalah, S., Sauveron, D.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1109/GCAIoT63427.2024.10833588
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/24426/1/Published_DECML_Distributed_Edge_Consensus_Machine_Learning.pdf
-
Uni-directional graph structure learning-based multivariate time series anomaly detection with dynamic prior knowledge
He, S., Li, G., Wang, J., Xie, K., Sharma, P. K.
International Journal of Machine Learning and Cybernetics, vol. 16, no. 1, pp. 267-283
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1007/s13042-024-02212-5
- Additional Links
-
View publication in Scopus
-
A dual encoder crack segmentation network with Haar wavelet-based high–low frequency attention
Zhang, J., Zeng, Z., Sharma, P. K., Alfarraj, O., Tolba, A., Wang, J.
Expert Systems with Applications, vol. 256, 124950
Contributions to Journals: Articles
- Online
-
https://github.com/zZhiG/DECS-Net
- Digital Object Identifier
-
https://doi.org/10.1016/j.eswa.2024.124950
- Additional Links
-
View publication in Scopus
-
Automated Dependency Mapping for Web API Security Testing Using Large Language Models
Li, W., Guo, Y.
ACM CCS 2024, pp. 5024 - 5026
Contributions to Conferences: Posters
- Digital Object Identifier
-
https://doi.org/10.1145/3658644
-
Probabilistic Strategy Logic with Degrees of Observability
Mu, C., Motamed, N., Alechina, N., Logan, B.
Working Papers and Discussion Papers
-
Personalised Multi-Task Federated Learning for Diabetic Retinopathy Medical Image Classification
Li, Y., Sharma, P., Leontidis, G., Yi, D.
Contributions to Journals: Conference Articles