Theo dõi
Erwin Adi
Erwin Adi
Deloitte Risk Advisory Pty Ltd
Email được xác minh tại deloitte.com.au
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32, 16205-16233, 2020
2482020
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
S Zeadally, E Adi, Z Baig, I Khan
IEEE Access 8, 2020
2132020
A new threat intelligence scheme for safeguarding industry 4.0 systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access 6, 32910-32924, 2018
1642018
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
742018
Case study for restaurant queuing model
M Dharmawirya, E Adi
International Conference on Management and Artificial Intelligence, 52 - 55, 2011
692011
Harvesting real time traffic information from twitter
R Kosala, E Adi
Procedia Engineering 50, 1-11, 2012
612012
Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
512017
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19, 79-86, 2016
392016
Low-Rate Denial-of-Service Attacks against HTTP/2 Services
E Adi, Z Baig, CP Lam, P Hingston
The 5th International Conference on IT Convergence and Security, 2015
342015
Analysis of expected and actual waiting time in fast food restaurants
M Dharmawirya, H Oktadiana, E Adi
Industrial Engineering Letters 2 (5), 8 - 17, 2012
262012
AI-based audit of fuzzy front end innovation using ISO56002
R Khan, E Adi, O Hussain
Managerial Auditing Journal 36 (4), 564-590, 2021
172021
Investigating Login Features in Smartphone Apps
N Micallef, E Adi, G Misra
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
152018
Comparison of classification algorithms to tell bots and humans apart
CH Saputra, E Adi, S Revina
Journal of Next Generation Information Technology 4 (7), 23-32, 2013
142013
Gamification: Blood donor apps for IOS devices
AC Sabani, IBK Manuaba, E Adi
Journal of Games, Game Art, and Gamification 1 (1), 14-26, 2016
92016
A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting
E Adi
Procedia Engineering, 19-28, 2012
92012
Case study for restaurant queuing model
D Mathias, E Adi
International Conference on Management and Artificial Intelligence IPEDR 6, 2011
72011
Learn street skateboarding through 3D simulations of angle rotation
E Adi, IGMK Aditya, M Citrawati
Journal of Information Technology Education: Research 9 (1), 217-234, 2010
62010
Denial-of-service attack modelling and detection for HTTP/2 services
E Adi
Edith Cowan University, 2017
52017
Website Vulnerability to Session Fixation Attacks
B Nathani, E Adi
Journal of Information Engineering and Applications ISSN 2224-5782 (print …, 2012
52012
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
E Adi, Z Baig, S Zeadally
Applied Cybersecurity & Internet Governance 1 (1), 1-23, 2022
42022
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20