The state of the art in intrusion prevention and detection ASK Pathan Publisher: CRC press, 2014 | 178 | 2014 |
Intrusion detection using reduced-size RNN based on feature grouping M Sheikhan, Z Jadidi, A Farrokhi Neural Computing and Applications 21, 1185-1190, 2012 | 161 | 2012 |
Flow-based anomaly detection using neural network optimized with GSA algorithm Z Jadidi, V Muthukkumarasamy, E Sithirasenan, M Sheikhan 2013 IEEE 33rd international conference on distributed computing systems …, 2013 | 102 | 2013 |
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network M Sheikhan, Z Jadidi Neural Computing and Applications 24, 599-611, 2014 | 83 | 2014 |
Analysis of security issues and countermeasures for the industrial internet of things S Pal, Z Jadidi Applied Sciences 11 (20), 9393, 2021 | 48 | 2021 |
A threat hunting framework for industrial control systems Z Jadidi, Y Lu IEEE Access 9, 164118-164130, 2021 | 33 | 2021 |
Misuse detection using hybrid of association rule mining and connectionist modeling M Sheikhan, Z Jadidi World Applied Sciences Journal 7, 31-37, 2009 | 33 | 2009 |
A high precision crack classification system using multi-layered image processing and deep belief learning J Jo, Z Jadidi Structure and Infrastructure Engineering 16 (2), 297-305, 2020 | 30 | 2020 |
Metaheuristic algorithms based flow anomaly detector Z Jadidi, V Muthukkumarasamy, E Sithirasenan 2013 19th Asia-Pacific Conference on Communications (APCC), 717-722, 2013 | 20 | 2013 |
Automated detection-in-depth in industrial control systems Z Jadidi, E Foo, M Hussain, C Fidge The International Journal of Advanced Manufacturing Technology 118 (7), 2467 …, 2022 | 19 | 2022 |
Anomaly detection for insider attacks from untrusted intelligent electronic devices in substation automation systems X Wang, C Fidge, G Nourbakhsh, E Foo, Z Jadidi, C Li IEEE Access 10, 6629-6649, 2022 | 18 | 2022 |
Securing manufacturing using blockchain Z Jadidi, A Dorri, R Jurdak, C Fidge 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 18 | 2020 |
Design and development of automated threat hunting in industrial control systems M Arafune, S Rajalakshmi, L Jaldon, Z Jadidi, S Pal, E Foo, ... 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 15 | 2022 |
Flow-based anomaly detection using semisupervised learning Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh 2015 9th International Conference on Signal Processing and Communication …, 2015 | 15 | 2015 |
A drone-based building inspection system using software-agents J Jo, Z Jadidi, B Stantic Intelligent Distributed Computing XI, 115-121, 2018 | 14 | 2018 |
A probabilistic sampling method for efficient flow-based analysis Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh Journal of Communications and Networks 18 (5), 818-825, 2016 | 13 | 2016 |
Performance of flow-based anomaly detection in sampled traffic Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh Journal of Networks 10 (9), 512, 2015 | 13 | 2015 |
Multi-step attack detection in industrial control systems using causal analysis Z Jadidi, J Hagemann, D Quevedo Computers in Industry 142, 103741, 2022 | 11 | 2022 |
Addressing adversarial machine learning attacks in smart healthcare perspectives A Selvakkumar, S Pal, Z Jadidi Sensing Technology: Proceedings of ICST 2022, 269-282, 2022 | 11 | 2022 |
Protocol-based and hybrid access control for the iot: Approaches and research opportunities S Pal, Z Jadidi Sensors 21 (20), 6832, 2021 | 11 | 2021 |