关注
Naghmeh Moradpoor Sheykhkanloo
Naghmeh Moradpoor Sheykhkanloo
Lecturer in Cybersecurity & Networks
在 napier.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Employing machine learning techniques for detection and classification of phishing emails
N Moradpoor, B Clavie, B Buchanan
2017 Computing Conference, 149-156, 2017
662017
Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset
J Foley, N Moradpoor, H Ochenyi
Security and Communication Networks 2020 (1), 2804291, 2020
522020
PLC memory attack detection and response in a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
International Journal of Critical Infrastructure Protection 26, 100300, 2019
372019
Employing neural networks for the detection of SQL injection attack
NM Sheykhkanloo
Proceedings of the 7th International Conference on Security of Information …, 2014
362014
Insider threat detection using supervised machine learning algorithms on an extremely imbalanced dataset
NM Sheykhkanloo, A Hall
International Journal of Cyber Warfare and Terrorism (IJCWT) 10 (2), 1-26, 2020
342020
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell
2018 international conference on cyber security and protection of digital …, 2018
342018
Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier
AJ Hall, N Pitropakis, WJ Buchanan, N Moradpoor
2018 IEEE International Conference on Big Data (Big Data), 5034-5039, 2018
302018
A learning-based neural network model for the detection and classification of SQL injection attacks
NM Sheykhkanloo
International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2), 16-41, 2017
292017
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques
NM Sheykhkanloo
Proceedings of the 8th International Conference on Security of Information …, 2015
232015
Vulnerability assessment of objective function of RPL protocol for Internet of Things
F Semedo, N Moradpoor, M Rafiq
Proceedings of the 11th International Conference on Security of Information …, 2018
192018
Implementation and detection of novel attacks to the PLC memory of a clean water supply system
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
Technology Trends: 4th International Conference, CITT 2018, Babahoyo …, 2019
162019
Introduction to security onion
R Heenan, N Moradpoor
152016
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks
N Moradpoor, G Parr, S McClean, B Scotney
Optical Switching and Networking 10 (4), 439-457, 2013
152013
Hybrid optical and wireless technology integrations for next generation broadband access networks
N Moradpoor, G Parr, S McClean, B Scotney, G Owusu
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
152011
Building towards automated cyberbullying detection: A comparative analysis
LM Al-Harigy, HA Al-Nuaim, N Moradpoor, Z Tan
Computational Intelligence and Neuroscience 2022 (1), 4794227, 2022
142022
Implementation and evaluation of physical, hybrid, and virtual testbeds for cybersecurity analysis of industrial control systems
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell, ...
Symmetry 13 (3), 519, 2021
142021
A hybrid deep learning-based intrusion detection system for IoT networks
NW Khan, MS Alshehri, MA Khan, S Almakdi, N Moradpoor, A Alazeb, ...
Math. Biosci. Eng 20 (8), 13491-13520, 2023
132023
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*
A Robles-Durazno, N Moradpoor, J McWhinnie, G Russell
2019 IEEE 15th International Conference on Control and Automation (ICCA …, 2019
122019
A survey of Intrusion Detection System technologies
R Heenan, N Moradpoor
The First Post Graduate Cyber Security Symposium, 2016
92016
A pattern recognition neural network model for detection and classification of SQL injection attacks
NM Sheykhkanloo
International Journal of Computer and Information Engineering 9 (6), 1436-1446, 2015
82015
系统目前无法执行此操作,请稍后再试。
文章 1–20