Follow
Naghmeh Moradpoor Sheykhkanloo
Naghmeh Moradpoor Sheykhkanloo
Lecturer in Cybersecurity & networks
Verified email at napier.ac.uk - Homepage
Title
Cited by
Cited by
Year
Employing machine learning techniques for detection and classification of phishing emails
N Moradpoor, B Clavie, B Buchanan
2017 Computing Conference, 149-156, 2017
652017
Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset
J Foley, N Moradpoor, H Ochen
Security and Communication Networks 2020, 1-17, 2020
522020
PLC memory attack detection and response in a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
International Journal of Critical Infrastructure Protection 26, 100300, 2019
362019
Employing neural networks for the detection of SQL injection attack
NM Sheykhkanloo
Proceedings of the 7th International Conference on Security of Information …, 2014
362014
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell
2018 international conference on cyber security and protection of digital …, 2018
342018
Insider threat detection using supervised machine learning algorithms on an extremely imbalanced dataset
NM Sheykhkanloo, A Hall
International Journal of Cyber Warfare and Terrorism (IJCWT) 10 (2), 1-26, 2020
322020
A learning-based neural network model for the detection and classification of SQL injection attacks
NM Sheykhkanloo
International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2), 16-41, 2017
292017
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
282018
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques
NM Sheykhkanloo
Proceedings of the 8th International Conference on Security of Information …, 2015
232015
Vulnerability assessment of objective function of RPL protocol for Internet of Things
F Semedo, N Moradpoor, M Rafiq
Proceedings of the 11th International Conference on Security of Information …, 2018
182018
Implementation and detection of novel attacks to the PLC memory of a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
Technology Trends: 4th International Conference, CITT 2018, Babahoyo …, 2019
162019
Introduction to security onion
R Heenan, N Moradpoor
152016
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks
N Moradpoor, G Parr, S McClean, B Scotney
Optical Switching and Networking 10 (4), 439-457, 2013
152013
Hybrid optical and wireless technology integrations for next generation broadband access networks
N Moradpoor, G Parr, S McClean, B Scotney, G Owusu
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
152011
Building towards automated cyberbullying detection: A comparative analysis
LM Al-Harigy, HA Al-Nuaim, N Moradpoor, Z Tan
Computational Intelligence and Neuroscience 2022, 2022
142022
Implementation and evaluation of physical, hybrid, and virtual testbeds for cybersecurity analysis of industrial control systems
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
Symmetry 13 (3), 519, 2021
142021
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell
2019 IEEE 15th International Conference on Control and Automation (ICCA …, 2019
122019
A hybrid deep learning-based intrusion detection system for IoT networks
NW Khan, MS Alshehri, MA Khan, S Almakdi, N Moradpoor, A Alazeb, ...
Math. Biosci. Eng 20 (8), 13491-13520, 2023
112023
A survey of Intrusion Detection System technologies
R Heenan, N Moradpoor
The First Post Graduate Cyber Security Symposium, 2016
92016
A pattern recognition neural network model for detection and classification of SQL injection attacks
NM Sheykhkanloo
International Journal of Computer and Information Engineering 9 (6), 1436-1446, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20