Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity S Zeadally, E Adi, Z Baig, I Khan IEEE Access 8, 2020 | 355 | 2020 |
Machine learning and data analytics for the IoT E Adi, A Anwar, Z Baig, S Zeadally Neural computing and applications 32, 16205-16233, 2020 | 322 | 2020 |
A new threat intelligence scheme for safeguarding industry 4.0 systems N Moustafa, E Adi, B Turnbull, J Hu IEEE Access 6, 32910-32924, 2018 | 184 | 2018 |
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli | 78 | 2018 |
Case study for restaurant queuing model M Dharmawirya, E Adi International Conference on Management and Artificial Intelligence, 52 - 55, 2011 | 75 | 2011 |
Harvesting real time traffic information from twitter R Kosala, E Adi Procedia Engineering 50, 1-11, 2012 | 63 | 2012 |
Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services E Adi, Z Baig, P Hingston Journal of Network and Computer Applications 91, 1-13, 2017 | 54 | 2017 |
Distributed denial-of-service attacks against http/2 services E Adi, ZA Baig, P Hingston, CP Lam Cluster Computing 19, 79-86, 2016 | 40 | 2016 |
Low-Rate Denial-of-Service Attacks against HTTP/2 Services E Adi, Z Baig, CP Lam, P Hingston The 5th International Conference on IT Convergence and Security, 2015 | 37 | 2015 |
AI-based audit of fuzzy front end innovation using ISO56002 R Khan, E Adi, O Hussain Managerial Auditing Journal 36 (4), 564-590, 2021 | 27 | 2021 |
Analysis of expected and actual waiting time in fast food restaurants M Dharmawirya, H Oktadiana, E Adi Industrial Engineering Letters 2 (5), 8 - 17, 2012 | 26 | 2012 |
Investigating Login Features in Smartphone Apps N Micallef, E Adi, G Misra Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018 | 17 | 2018 |
Comparison of classification algorithms to tell bots and humans apart CH Saputra, E Adi, S Revina Journal of Next Generation Information Technology 4 (7), 23-32, 2013 | 14 | 2013 |
Gamification: Blood donor apps for IOS devices AC Sabani, IBK Manuaba, E Adi Journal of Games, Game Art, and Gamification 1 (1), 14-26, 2016 | 10 | 2016 |
A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting E Adi Procedia Engineering, 19-28, 2012 | 10 | 2012 |
Learn street skateboarding through 3D simulations of angle rotation E Adi, IGMK Aditya, M Citrawati Journal of Information Technology Education: Research 9 (1), 217-234, 2010 | 8 | 2010 |
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions E Adi, Z Baig, S Zeadally Applied Cybersecurity & Internet Governance 1 (1), 1-23, 2022 | 7 | 2022 |
Case study for restaurant queuing model D Mathias, E Adi International Conference on Management and Artificial Intelligence IPEDR 6, 2011 | 7 | 2011 |
Denial-of-service attack modelling and detection for HTTP/2 services E Adi Edith Cowan University, 2017 | 5 | 2017 |
Website Vulnerability to Session Fixation Attacks B Nathani, E Adi Journal of Information Engineering and Applications ISSN 2224-5782 (print …, 2012 | 5 | 2012 |