Naghmeh Moradpoor Sheykhkanloo
Orcid: 0000-0002-8709-2678
According to our database1,
Naghmeh Moradpoor Sheykhkanloo
authored at least 25 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024
2023
Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments?
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023
Proceedings of the 8th South-East Europe Design Automation, 2023
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
2022
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
Proceedings of the International Conference on Cybersecurity, 2022
2021
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
Symmetry, 2021
Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system.
Ad Hoc Networks, 2021
VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
2020
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset.
Secur. Commun. Networks, 2020
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset.
Int. J. Cyber Warf. Terror., 2020
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
2019
Int. J. Crit. Infrastructure Prot., 2019
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019
2018
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.
Int. J. Cyber Warf. Terror., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
2015
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
2013
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.
Opt. Switch. Netw., 2013
2012
PhD thesis, 2012
2011
Hybrid optical and wireless technology integrations for next generation broadband access networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011