Naghmeh Moradpoor Sheykhkanloo

Orcid: 0000-0002-8709-2678

According to our database1, Naghmeh Moradpoor Sheykhkanloo authored at least 40 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Towards a cyberbullying detection approach: fine-tuned contrastive self-supervised learning for data augmentation.
Int. J. Data Sci. Anal., April, 2025

APOLLO: a proximity-oriented, low-layer orchestration algorithm for resources optimization in mist computing.
Wirel. Networks, January, 2025

A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping.
Future Internet, 2025

Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV.
Proceedings of the 26th IEEE International Symposium on a World of Wireless, 2025

Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles.
Proceedings of the Availability, Reliability and Security, 2025

2024
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality.
CoRR, 2024

Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities.
CoRR, 2024

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Lightweight Blockchain Prototype for Food Supply Chain Management.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge Proofs.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A Blockchain-based two Factor Honeytoken Authentication System.
CoRR, 2023

Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments?
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Reliability Analysis of Fault Tolerant Memory Systems.
Proceedings of the 8th South-East Europe Design Automation, 2023

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
Proceedings of the International Conference on Cybersecurity, 2022

2021
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
Symmetry, 2021

Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system.
Ad Hoc Networks, 2021

VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset.
Secur. Commun. Networks, 2020

Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset.
Int. J. Cyber Warf. Terror., 2020

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

2019
PLC memory attack detection and response in a clean water supply system.
Int. J. Crit. Infrastructure Prot., 2019

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

2018
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.
Int. J. Cyber Warf. Terror., 2017

Insider threat detection using principal component analysis and self-organising map.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2015
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
Employing Neural Networks for the Detection of SQL Injection Attack.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.
Opt. Switch. Netw., 2013

2012
Optimisation analytics for bandwidth resource management in converted IP networks.
PhD thesis, 2012

2011
Hybrid optical and wireless technology integrations for next generation broadband access networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011


  Loading...