Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment G Ayoade, V Karande, L Khan, K Hamlen IEEE International Conference on Information Reuse and Integration (IRI), 15 …, 2018 | 200 | 2018 |
A survey on hypervisor-based monitoring: approaches, applications, and evolutions E Bauman, G Ayoade, Z Lin ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015 | 124 | 2015 |
Automated Threat Report Classification over Multi-Source Data G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham 2018 IEEE 4th International Conference on Collaboration and Internet Computing, 2018 | 60 | 2018 |
Multistream classification for cyber threat data with heterogeneous feature space YF Li, Y Gao, G Ayoade, H Tao, L Khan, B Thuraisingham The World Wide Web Conference, 2992-2998, 2019 | 31 | 2019 |
Secure data processing for IoT middleware systems G Ayoade, A El-Ghamry, V Karande, L Khan, M Alrahmawy, RM Zakria The Journal of Supercomputing, 2018 | 28 | 2018 |
Smart contract defense through bytecode rewriting G Ayoade, E Bauman, L Khan, K Hamlen 2019 IEEE International Conference on Blockchain (Blockchain), 384-389, 2019 | 25 | 2019 |
Unsupervised deep embedding for novel class detection over data stream AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ... 2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017 | 24 | 2017 |
Evolving advanced persistent threat detection using provenance graph and metric learning G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 16 | 2020 |
Automating Cyberdeception Evaluation with Deep Learning. G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan HICSS 3, 1-10, 2020 | 16 | 2020 |
Improving intrusion detectors by crook-sourcing F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 14 | 2019 |
P2V: Effective website fingerprinting using vector space representations K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham 2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015 | 13 | 2015 |
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning KA Akbar, Y Wang, G Ayoade, Y Gao, A Singhal, L Khan, ... IEEE Transactions on Dependable and Secure Computing 20 (5), 3957-3969, 2022 | 5 | 2022 |
Crook-sourced intrusion detection as a service F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan Journal of Information Security and Applications 61, 102880, 2021 | 3 | 2021 |
Deception-enhanced threat sensing for resilient intrusion detection F Araujo, G Ayoade, KW Hamlen, L Khan Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019 | 3 | 2019 |
A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem H Hong, L Khan, G Ayoade, Z Shaohua, W Yong IEEE International Conference on Information Reuse and Integration (IRI …, 2018 | 2 | 2018 |
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data YF Li, Y Gao, G Ayoade, L Khan, A Singhal, B Thuraisingham IEEE Transactions on Dependable and Secure Computing 21 (1), 1-11, 2022 | 1 | 2022 |
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms GG Ayoade The University of Texas at Dallas, 2019 | | 2019 |
IRI 2018 IC Anindya, M Kantarcioglu, R Bauder, T Khoshgoftaar, G Ayoade, ... | | |