Select Publications
Journal articles
, 2025, 'DT-BFL: Digital Twins for Blockchain-enabled Federated Learning in Internet of Things networks', Ad Hoc Networks, 178, http://dx.doi.org/10.1016/j.adhoc.2025.103934
, 2025, 'Privacy preservation of Internet of Things–integrated social networks: a survey and future challenges', International Journal of Web Information Systems, 21, pp. 372 - 431, http://dx.doi.org/10.1108/IJWIS-04-2024-0120
, 2025, 'Modelling Cascading Failure in Complex CPSS to Inform Resilient Mission Assurance: An Intelligent Transport System Case Study', Entropy, 27, http://dx.doi.org/10.3390/e27080793
, 2025, 'Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling', Future Internet, 17, http://dx.doi.org/10.3390/fi17070282
, 2025, 'Vulnerability defence using hybrid moving target defence in Internet of Things systems', Computers and Security, 153, http://dx.doi.org/10.1016/j.cose.2025.104380
, 2025, 'A survey on resilient microgrid system from cybersecurity perspective', Applied Soft Computing, 175, http://dx.doi.org/10.1016/j.asoc.2025.113088
, 2025, 'Generative fuzzer-driven vulnerability detection in the Internet of Things networks', Applied Soft Computing, 174, http://dx.doi.org/10.1016/j.asoc.2025.112973
, 2025, 'BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems', Ad Hoc Networks, 169, http://dx.doi.org/10.1016/j.adhoc.2025.103760
, 2025, 'LGP: Layerwise Gradient Purify for Robust Federated Learning against Poisoning Attacks', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2025.3604778
, 2025, 'UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems', IEEE Open Journal of the Computer Society, 6, pp. 543 - 553, http://dx.doi.org/10.1109/OJCS.2025.3564266
, 2025, 'VIFL: vulnerability identification using federated learning in the internet of things systems', Computing, 107, http://dx.doi.org/10.1007/s00607-024-01365-z
, 2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3
, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039
, 2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463
, 2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387
, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879
, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816
, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391
, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000
, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 893 - 903, http://dx.doi.org/10.1109/TITS.2021.3130906
, 2023, 'Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards', IEEE Access, 11, pp. 60737 - 60757, http://dx.doi.org/10.1109/ACCESS.2023.3287100
, 2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks', ACM Transactions on Multimedia Computing Communications and Applications, 18, http://dx.doi.org/10.1145/3537899
, 2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786
, 2022, 'Social media influence, trust, and conflict: An interview based study of leadership perceptions', Technology in Society, 68, http://dx.doi.org/10.1016/j.techsoc.2021.101836
, 2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10, http://dx.doi.org/10.1109/OJCS.2021.3138332
, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032
, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385
, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
, 2021, 'Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies', IEEE Access, 9, pp. 9365 - 9382, http://dx.doi.org/10.1109/ACCESS.2020.3048269
, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability Switzerland, 12, http://dx.doi.org/10.3390/SU12166434
, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
, 2019, 'The modelling and simulation of integrated battlefield cyber-kinetic effects', International Journal of Cyber Warfare and Terrorism, 9, pp. 1 - 26, http://dx.doi.org/10.4018/IJCWT.2019100101
, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
, 2017, 'Attrition rates and maneuver in agent-based simulation models', Journal of Defense Modeling and Simulation, 14, pp. 257 - 272, http://dx.doi.org/10.1177/1548512917692693
, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
, 2016, 'The cyber conceptual framework for developing military doctrine', Defence Studies, 16, pp. 270 - 298, http://dx.doi.org/10.1080/14702436.2016.1187568
, 2015, 'Automated event and social network extraction from digital evidence sources with ontological mapping', Digital Investigation, 13, pp. 94 - 106, http://dx.doi.org/10.1016/j.diin.2015.04.004
, 2010, 'The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation', Ares 2010 5th International Conference on Availability Reliability and Security, pp. 629 - 634, http://dx.doi.org/10.1109/ARES.2010.74
, 2009, 'Message from WSDF workshop co-chairs', Proceedings International Conference on Availability Reliability and Security Ares 2009, http://dx.doi.org/10.1109/ARES.2009.175
, 2008, 'Extracting evidence using google desktop search', IFIP International Federation for Information Processing, 285, pp. 43 - 50, http://dx.doi.org/10.1007/978-0-387-84927-0_4