Abdul Rahman

Orcid: 0000-0002-9448-9809

According to our database1, Abdul Rahman authored at least 47 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design.
Internet Things, April, 2024

A Review of Cybersecurity Incidents in the Food and Agriculture Sector.
CoRR, 2024

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning.
CoRR, 2024

Discovering Command and Control Channels Using Reinforcement Learning.
CoRR, 2024

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things.
J. Cybersecur. Priv., October, 2023

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
CoRR, 2023

Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach.
CoRR, 2023

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention.
CoRR, 2023

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks.
CoRR, 2023

Anomaly Detection via Federated Learning.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Novel Approach to User Agent String Parsing for Vulnerability Analysis Using Multi-Headed Attention.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

Enhancing Exfiltration Path Analysis Using Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2023

2022
On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things.
IEEE Internet Things J., 2022

Construction of an Online Education Platform Based on SOA Architecture and Multimedia Technology.
Int. J. e Collab., 2022

Anomaly Detection via Federated Learning.
CoRR, 2022

Lateral Movement Detection Using User Behavioral Analysis.
CoRR, 2022

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry.
CoRR, 2022

Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace.
Proceedings of the IEEE Military Communications Conference, 2022

Zero Day Threat Detection Using Metric Learning Autoencoders.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Trustworthy AI Solutions for Cyberbiosecurity Challenges in Water Supply Systems.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

Detection of COVID-19 in High Resolution Computed Tomography Using Vision Transformer.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Using Cyber Terrain in Reinforcement Learning for Penetration Testing.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Improvement of substation Monitoring aimed to improve its efficiency with the help of Big Data Analysis*.
J. Intell. Syst., 2021

AI Assurance using Causal Inference: Application to Public Policy.
CoRR, 2021

Using Cyber Terrain in Reinforcement Learning for Penetration Testing.
CoRR, 2021

An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems.
IEEE Access, 2021

Crown Jewels Analysis using Reinforcement Learning with Attack Graphs.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Data-Driven Quickest Change Detection for Securing Federated Learning for Internet-of-Vehicles.
Proceedings of the IEEE Global Communications Conference, 2021

2018
Globally Optimization Energy Grid Management System.
Proceedings of the Advances in Network-Based Information Systems, 2018

Efficient Resource Distribution in Cloud and Fog Computing.
Proceedings of the Advances in Network-Based Information Systems, 2018

2015
Face sketch recognition using sketching with words.
Int. J. Mach. Learn. Cybern., 2015

Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

2013
Investigation of OWA Operator Weights for Estimating Fuzzy Validity of Geometric Shapes.
Proceedings of the Advance Trends in Soft Computing, 2013

Estimation of f-validity of geometrical objects with OWA operator weights.
Proceedings of the FUZZ-IEEE 2013, 2013

2011
Optimal power management for the UTS plug-in hybrid electric vehicle
PhD thesis, 2011

Transmitting UWB-OFDM Using 16-QAM over Hybrid Flat Fading Channels.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Finding the 'Needle': Locating Interesting Nodes Using the K-shortest Paths Algorithm in MapReduce.
Proceedings of the Data Mining Workshops (ICDMW), 2011


  Loading...