Employing machine learning techniques for detection and classification of phishing emails N Moradpoor, B Clavie, B Buchanan 2017 Computing Conference, 149-156, 2017 | 65 | 2017 |
Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset J Foley, N Moradpoor, H Ochen Security and Communication Networks 2020, 1-17, 2020 | 52 | 2020 |
PLC memory attack detection and response in a clean water supply system A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ... International Journal of Critical Infrastructure Protection 26, 100300, 2019 | 36 | 2019 |
Employing neural networks for the detection of SQL injection attack NM Sheykhkanloo Proceedings of the 7th International Conference on Security of Information …, 2014 | 36 | 2014 |
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell 2018 international conference on cyber security and protection of digital …, 2018 | 34 | 2018 |
Insider threat detection using supervised machine learning algorithms on an extremely imbalanced dataset NM Sheykhkanloo, A Hall International Journal of Cyber Warfare and Terrorism (IJCWT) 10 (2), 1-26, 2020 | 32 | 2020 |
A learning-based neural network model for the detection and classification of SQL injection attacks NM Sheykhkanloo International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2), 16-41, 2017 | 29 | 2017 |
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor 2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018 | 28 | 2018 |
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques NM Sheykhkanloo Proceedings of the 8th International Conference on Security of Information …, 2015 | 23 | 2015 |
Vulnerability assessment of objective function of RPL protocol for Internet of Things F Semedo, N Moradpoor, M Rafiq Proceedings of the 11th International Conference on Security of Information …, 2018 | 18 | 2018 |
Implementation and detection of novel attacks to the PLC memory of a clean water supply system A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ... Technology Trends: 4th International Conference, CITT 2018, Babahoyo …, 2019 | 16 | 2019 |
Introduction to security onion R Heenan, N Moradpoor | 15 | 2016 |
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks N Moradpoor, G Parr, S McClean, B Scotney Optical Switching and Networking 10 (4), 439-457, 2013 | 15 | 2013 |
Hybrid optical and wireless technology integrations for next generation broadband access networks N Moradpoor, G Parr, S McClean, B Scotney, G Owusu 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 15 | 2011 |
Building towards automated cyberbullying detection: A comparative analysis LM Al-Harigy, HA Al-Nuaim, N Moradpoor, Z Tan Computational Intelligence and Neuroscience 2022, 2022 | 14 | 2022 |
Implementation and evaluation of physical, hybrid, and virtual testbeds for cybersecurity analysis of industrial control systems A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ... Symmetry 13 (3), 519, 2021 | 14 | 2021 |
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels* A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell 2019 IEEE 15th International Conference on Control and Automation (ICCA …, 2019 | 12 | 2019 |
A hybrid deep learning-based intrusion detection system for IoT networks NW Khan, MS Alshehri, MA Khan, S Almakdi, N Moradpoor, A Alazeb, ... Math. Biosci. Eng 20 (8), 13491-13520, 2023 | 11 | 2023 |
A survey of Intrusion Detection System technologies R Heenan, N Moradpoor The First Post Graduate Cyber Security Symposium, 2016 | 9 | 2016 |
A pattern recognition neural network model for detection and classification of SQL injection attacks NM Sheykhkanloo International Journal of Computer and Information Engineering 9 (6), 1436-1446, 2015 | 8 | 2015 |