关注
Erwin Adi
Erwin Adi
Deloitte Risk Advisory Pty Ltd
在 deloitte.com.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32, 16205-16233, 2020
1802020
A new threat intelligence scheme for safeguarding industry 4.0 systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access 6, 32910-32924, 2018
1362018
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
S Zeadally, E Adi, Z Baig, I Khan
IEEE Access 8, 2020
1282020
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
632018
Harvesting real time traffic information from twitter
R Kosala, E Adi
Procedia Engineering 50, 1-11, 2012
622012
Case study for restaurant queuing model
M Dharmawirya, E Adi
International Conference on Management and Artificial Intelligence, 52 - 55, 2011
622011
Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
442017
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19, 79-86, 2016
342016
Low-Rate Denial-of-Service Attacks against HTTP/2 Services
E Adi, Z Baig, CP Lam, P Hingston
The 5th International Conference on IT Convergence and Security, 2015
292015
Analysis of expected and actual waiting time in fast food restaurants
M Dharmawirya, H Oktadiana, E Adi
Industrial Engineering Letters 2 (5), 8 - 17, 2012
232012
Investigating Login Features in Smartphone Apps
N Micallef, E Adi, G Misra
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
142018
Comparison of classification algorithms to tell bots and humans apart
CH Saputra, E Adi, S Revina
Journal of Next Generation Information Technology 4 (7), 23-32, 2013
102013
A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting
E Adi
Procedia Engineering, 19-28, 2012
92012
Gamification: blood donor apps for iOS devices
AC Sabani, IBK Manuaba, E Adi
Journal of Games, Game Art, and Gamification 1 (1), 14-26, 2016
82016
Case study for restaurant queuing model
D Mathias, E Adi
International Conference on Management and Artificial Intelligence IPEDR 6, 2011
72011
Case Study for Restaurant Queuing Model. International Conference on Management and Artificial Intelligence
E Adi, M Dharmawirya
IPEDR, 2011
62011
Learn street skateboarding through 3D simulations of angle rotation
E Adi, IGMK Aditya, M Citrawati
Journal of Information Technology Education: Research 9 (1), 217-234, 2010
62010
AI-based audit of fuzzy front end innovation using ISO56002
R Khan, E Adi, O Hussain
Managerial Auditing Journal 36 (4), 564-590, 2021
42021
Website Vulnerability to Session Fixation Attacks
B Nathani, E Adi
Journal of Information Engineering and Applications ISSN 2224-5782 (print …, 2012
42012
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
E Adi, Z Baig, S Zeadally
Applied Cybersecurity & Internet Governance 1 (1), 1-23, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20