Hamed Aboutorab

Orcid: 0000-0002-9285-9917

According to our database1, Hamed Aboutorab authored at least 20 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks.
CoRR, April, 2025

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning.
CoRR, February, 2025

ConceptUML: Multiphase unsupervised threat detection via latent concept learning, Hidden Markov Models and topic modelling.
J. Inf. Secur. Appl., 2025

The evolving threat landscape of botnets: Comprehensive analysis of detection techniques in the age of artificial intelligence.
Internet Things, 2025

Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Evolving techniques in cyber threat hunting: A systematic review.
J. Netw. Comput. Appl., 2024

Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
J. Inf. Secur. Appl., 2024

Adaptive identification of supply chain disruptions through reinforcement learning.
Expert Syst. Appl., 2024

Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024

Security threats to agricultural artificial intelligence: Position and perspective.
Comput. Electron. Agric., 2024

Transformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia.
IEEE Access, 2024

A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

Named Entity Recognition in Construction Supply Chain Risk Management Using Transformer-Based Models and Genetic Algorithm-Driven Hyperparameter Tuning.
Proceedings of the International Conference on Electrical, 2024

2023
Reinforcement Learning-Based News Recommendation System.
IEEE Trans. Serv. Comput., 2023

POSSUM: PrOactive diSruption riSk identification for sUpply chain Management.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

A News Recommendation System for Environmental Risk Management.
Proceedings of the Second International Workshop on Linked Data-driven Resilience Research 2023 co-located with Extended Semantic Web Conference 2023 (ESWC 2023), 2023

2022
A reinforcement learning-based framework for disruption risk identification in supply chains.
Future Gener. Comput. Syst., 2022

2021
Joint optimization of maintenance and inventory policies for multi-unit systems.
Int. J. Syst. Assur. Eng. Manag., 2021

A survey on the suitability of risk identification techniques in the current networked environment.
J. Netw. Comput. Appl., 2021

2018
ZBWM: The Z-number extension of Best Worst Method and its application for supplier development.
Expert Syst. Appl., 2018


  Loading...