The state of the art in intrusion prevention and detection ASK Pathan Publisher: CRC press, 2014 | 190 | 2014 |
Intrusion detection using reduced-size RNN based on feature grouping M Sheikhan, Z Jadidi, A Farrokhi Neural Computing and Applications 21, 1185-1190, 2012 | 172 | 2012 |
Flow-based anomaly detection using neural network optimized with GSA algorithm Z Jadidi, V Muthukkumarasamy, E Sithirasenan, M Sheikhan 2013 IEEE 33rd international conference on distributed computing systems …, 2013 | 108 | 2013 |
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network M Sheikhan, Z Jadidi Neural Computing and Applications 24, 599-611, 2014 | 89 | 2014 |
Analysis of security issues and countermeasures for the industrial internet of things S Pal, Z Jadidi Applied Sciences 11 (20), 9393, 2021 | 61 | 2021 |
A threat hunting framework for industrial control systems Z Jadidi, Y Lu IEEE Access 9, 164118-164130, 2021 | 42 | 2021 |
A high precision crack classification system using multi-layered image processing and deep belief learning J Jo, Z Jadidi Structure and infrastructure engineering 16 (2), 297-305, 2020 | 35 | 2020 |
Anomaly detection for insider attacks from untrusted intelligent electronic devices in substation automation systems X Wang, C Fidge, G Nourbakhsh, E Foo, Z Jadidi, C Li IEEE Access 10, 6629-6649, 2022 | 34 | 2022 |
Misuse detection using hybrid of association rule mining and connectionist modeling M Sheikhan, Z Jadidi World Applied Sciences Journal 7, 31-37, 2009 | 33 | 2009 |
Securing manufacturing using blockchain Z Jadidi, A Dorri, R Jurdak, C Fidge 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 23 | 2020 |
Automated detection-in-depth in industrial control systems Z Jadidi, E Foo, M Hussain, C Fidge The International Journal of Advanced Manufacturing Technology 118 (7), 2467 …, 2022 | 22 | 2022 |
Design and development of automated threat hunting in industrial control systems M Arafune, S Rajalakshmi, L Jaldon, Z Jadidi, S Pal, E Foo, ... 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 21 | 2022 |
Metaheuristic algorithms based flow anomaly detector Z Jadidi, V Muthukkumarasamy, E Sithirasenan 2013 19th Asia-Pacific Conference on Communications (APCC), 717-722, 2013 | 21 | 2013 |
Protocol-based and hybrid access control for the IoT: approaches and research opportunities S Pal, Z Jadidi Sensors 21 (20), 6832, 2021 | 20 | 2021 |
Security of machine learning-based anomaly detection in cyber physical systems Z Jadidi, S Pal, N Nayak, A Selvakkumar, CC Chang, M Beheshti, ... 2022 International Conference on Computer Communications and Networks (ICCCN …, 2022 | 18 | 2022 |
A drone-based building inspection system using software-agents J Jo, Z Jadidi, B Stantic International Symposium on Intelligent and Distributed Computing, 115-121, 2017 | 17 | 2017 |
Correlation-based anomaly detection in industrial control systems Z Jadidi, S Pal, M Hussain, K Nguyen Thanh Sensors 23 (3), 1561, 2023 | 16 | 2023 |
A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics K Nguyen, S Pal, Z Jadidi, A Dorri, R Jurdak 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 16 | 2022 |
Flow-based anomaly detection using semisupervised learning Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh 2015 9th International Conference on Signal Processing and Communication …, 2015 | 16 | 2015 |
A probabilistic sampling method for efficient flow-based analysis Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh Journal of Communications and Networks 18 (5), 818-825, 2016 | 15 | 2016 |