-
21
Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint
Published 2021“…The advocacy of 'model once, run optimized anywhere' paradigm introduces potential new security threat to edge intelligence that is methodologically different from the well-known adversarial examples. …”
Get full text
Journal Article -
22
Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture /
Published 2023“…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. …”
Get full text
Get full text
software, multimedia -
23
Cognizant multitasking in multiobjective multifactorial evolution : MO-MFEA-II
Published 2021“…Thus, in the absence of any prior knowledge about the relationships between optimization functions, a threat of predominantly negative (harmful) transfer prevails. …”
Get full text
Journal Article -
24
Enhancement of a Stepping Stone Detection Algorithm Using Data Mining and Associate Rule Techniques (S/O: 12896)
Published 2020“…Less accurate detection and Active Perturbation Attack (APA) is the most problem that becomes a threat to SSD approach itself. By using hybrid approach to increase an accurate detection and intelligent technique to overcome the APA problem, this research proposed the combination of hybrid and intelligent SSD to as create Hybrid Intelligent SSD (HI-SSD). …”
Get full text
Monograph -
25
-
26
Malicious JavaScript detection web service
Published 2016“…Once users access to them without the strong protection from anti-virus products, users’ computers might be harmed and their information might be stolen. One of the biggest threats in these websites is the Malicious JavaScript. …”
Get full text
Final Year Project (FYP) -
27
Constructing envelopes: how institutional custodians can tame disruptive algorithms
Published 2024“…The infusion of algorithms into organizational fields—accelerated by advances in artificial intelligence—can have disruptive effects that trigger defensive responses. …”
Journal article -
28
Fault-injection based attacks and countermeasure on deep neural network accelerators
Published 2021“…This extra degree of manipulability offers more space of research exploration on the security threats, attack surfaces and countermeasures on modern DNN accelerators. …”
Get full text
Thesis-Doctor of Philosophy -
29
Evolution of software-defined networking foundations for IoT and 5G mobile networks
Published 2020“…The book explores the threats to 5G and IoT and how to implement effective security architecture for them. …”
Book -
30
Novel denial-of-service attacks against cloud-based multi-robot systems
Published 2022“…However, the introduction of cloud servers to multi-robot systems can also incur potential Denial-of-Service (DoS) threats, where an adversary can utilize the shared cloud resources to degrade or bring down the robot systems. …”
Get full text
Journal Article -
31
Voice conversion with parallel/non-parallel data and synthetic speech detection
Published 2019“…On the other hand, voice conversion also presents a threat to Automatic Speaker Verification (ASV) systems. …”
Get full text
Get full text
Thesis -
32
Streamlining Organizational Processes Through AI, IoT, Blockchain, and Virtual Environments /
Published [202Get full text
software, multimedia -
33
Malware detection and analysis in Android applications with mobile security framework (MobsF) using a permission-based approach
Published 2024Get full text
Conference or Workshop Item -
34
Evaluating & enhancing deep learning systems via out-of-distribution detection
Published 2022“…Finally, we introduce OOD defense approaches against two novel DL threats which fully evade traditional defenses. …”
Get full text
Thesis-Doctor of Philosophy -
35
Advanced data analytics for future smart grid stability assessment
Published 2022“…The outcomes of this Ph.D. research will enable a more secure, intelligent, and knowledge-transparent future of the next-generation smart grid. …”
Get full text
Thesis-Doctor of Philosophy