Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 336 | 2017 |
Denial of service attack detection through machine learning for the IoT NF Syed, Z Baig, A Ibrahim, C Valli Journal of Information and Telecommunication, 1-22, 2020 | 136 | 2020 |
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol NF Syed, ZA Baig, C Valli, A Ibrahim 2017 IEEE International Conference on Internet of Things (iThings), 2017 | 113* | 2017 |
A security review of local government using NIST CSF: a case study A Ibrahim, C Valli, I McAteer, J Chaudhry The Journal of Supercomputing, 2018 | 72 | 2018 |
A cancelable iris-and steganography-based user authentication system for the Internet of Things W Yang, S Wang, J Hu, A Ibrahim, G Zheng, MJ Macedo, MN Johnstone, ... Sensors 19 (13), 2985, 2019 | 38 | 2019 |
Integration of Biometrics and Steganography: A Comprehensive Review I McAteer, A Ibrahim, G Zheng, W Yang, C Valli Technologies 7 (2), 34, 2019 | 34 | 2019 |
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions MI Malik, A Ibrahim, P Hannay, LF Sikos Computers 12 (4), 79, 2023 | 26 | 2023 |
Steganalysis in computer forensics A Ibrahim Australian Digital Forensics Conference, 10, 2007 | 21 | 2007 |
Internet of Threats and Context Aware Security: Part Two J Chaudhry, A Ibrahim, AK Bashir http://sites.ieee.org/futuredirections/tech-policy-ethics/march-2017 …, 2017 | 6 | 2017 |
Analysis of attempted intrusions: intelligence gathered from SSH Honeypots P Rabadia, C Valli, A Ibrahim, ZA Baig Security Research Institute, Edith Cowan University, 2017 | 6 | 2017 |
Image similarity using dynamic time warping of fractal features A Ibrahim, C Valli 13th Australian Digital Forensics Conference, 2015 | 5 | 2015 |
Bringing defensive artificial intelligence capabilities to mobile devices K Chong, A Ibrahim Australian Information Security Management Conference, 41-50, 2018 | 3 | 2018 |
Application of 3D Delaunay Triangulation in Fingerprint Authentication System W Yang, G Zheng, A Ibrahim, J Chaudhry, S Wang, J Hu, C Valli International Conference on Mobile Networks and Management, 291-298, 2017 | 3 | 2017 |
Dhivehi OCR: Character Recognition of Thaana Script using Machine Generated Text and Tesseract OCR Engine A Ibrahim International Journal of Social Research and Innovation 1 (1), 2016 | 3 | 2016 |
Cyber Security for network of things (nots) in Military Systems: Challenges and Countermeasures MI Malik, IN McAteer, P Hannay, A Ibrahim, Z Baig, G Zheng Security Analytics for the Internet of Everything, 231, 2020 | 2 | 2020 |
Internet of Threats and Context Aware Security: Part One J Chaudhry, A Ibrahim, AK Bashir http://sites.ieee.org/futuredirections/tech-policy-ethics/january-2017 …, 2017 | 2 | 2017 |
Building a dataset for image steganography C Woolley, A Ibrahim, P Hannay Security Research Institute, Edith Cowan University, 2017 | 1 | 2017 |
Suitability of lacunarity measure for blind steganalysis A Ibrahim | 1 | 2014 |
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat A Ibrahim, P Haskell-Dowland The Conversation, 2021 | | 2021 |
Bio-inspired Cyber-Security for the Smart Grid N Syed, A Ibrahim, Z Baig, C Valli Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and …, 2019 | | 2019 |