Naghmeh Moradpoor Sheykhkanloo

Orcid: 0000-0002-8709-2678

According to our database1, Naghmeh Moradpoor Sheykhkanloo authored at least 25 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024

2023
A Blockchain-based two Factor Honeytoken Authentication System.
CoRR, 2023

Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments?
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Reliability Analysis of Fault Tolerant Memory Systems.
Proceedings of the 8th South-East Europe Design Automation, 2023

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
Proceedings of the International Conference on Cybersecurity, 2022

2021
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
Symmetry, 2021

Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system.
Ad Hoc Networks, 2021

VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset.
Secur. Commun. Networks, 2020

Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset.
Int. J. Cyber Warf. Terror., 2020

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

2019
PLC memory attack detection and response in a clean water supply system.
Int. J. Crit. Infrastructure Prot., 2019

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

2018
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.
Int. J. Cyber Warf. Terror., 2017

Insider threat detection using principal component analysis and self-organising map.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2015
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
Employing Neural Networks for the Detection of SQL Injection Attack.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.
Opt. Switch. Netw., 2013

2012
Optimisation analytics for bandwidth resource management in converted IP networks.
PhD thesis, 2012

2011
Hybrid optical and wireless technology integrations for next generation broadband access networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011


  Loading...