default search action
Zahra Jadidi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
A graph representation framework for encrypted network traffic classification. Comput. Secur. 148: 104134 (2025) - 2024
- [j19]Shantanu Pal, Saifur Rahman, Maedeh Beheshti, Ahsan Habib, Zahra Jadidi, Chandan K. Karmakar:
The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis. IEEE Access 12: 66478-66494 (2024) - [j18]Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Volkan Dedeoglu, Raja Jurdak:
Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain. Comput. Networks 252: 110686 (2024) - [j17]Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, Mukhtar Hussain, Ernest Foo:
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey. J. Inf. Secur. Appl. 83: 103786 (2024) - [j16]Mukhtar Hussain, Shantanu Pal, Zahra Jadidi, Ernest Foo, Salil S. Kanhere:
Federated Zero Trust Architecture using Artificial Intelligence. IEEE Wirel. Commun. 31(2): 30-35 (2024) - 2023
- [j15]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
Software Vulnerability Detection Using Informed Code Graph Pruning. IEEE Access 11: 135626-135644 (2023) - [j14]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering a data interpreted petri net model of industrial control systems for anomaly detection. Expert Syst. Appl. 230: 120511 (2023) - [j13]Hejia Zhou, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments. IEEE Internet Things Mag. 6(1): 64-68 (2023) - [j12]Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak:
The Role of Cyber Threat Intelligence Sharing in the Metaverse. IEEE Internet Things Mag. 6(1): 154-160 (2023) - [j11]Zahra Jadidi, Shantanu Pal, Mukhtar Hussain, Kien Nguyen Thanh:
Correlation-Based Anomaly Detection in Industrial Control Systems. Sensors 23(3): 1561 (2023) - [c21]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. ACISP 2023: 630-650 - [c20]Jacob Soper, Yue Xu, Kien Nguyen, Ernest Foo, Zahra Jadidi:
A two-pass approach for minimising error in synthetically generated network traffic data sets. ACSW 2023: 18-27 - [c19]Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak:
A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence. ICBC 2023: 1-9 - [c18]Zahra Jadidi, Shantanu Pal, Qinyi Li, Ernest Foo:
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust. ICST 2023: 1-6 - [c17]Shantanu Pal, Zahra Jadidi, Poopak Alaeifar, Ernest Foo:
The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence. ICST 2023: 1-6 - [c16]Shantanu Pal, Anusha Vangala, Zahra Jadidi, Zhe Hou, Ashok Kumar Das:
Security, Privacy and Trust for the Metaverse of Things. MetaCom 2023: 146-150 - 2022
- [j10]Xuelei Wang, Colin J. Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li:
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems. IEEE Access 10: 6629-6649 (2022) - [j9]Zahra Jadidi, Joshua Hagemann, Daniel E. Quevedo:
Multi-step attack detection in industrial control systems using causal analysis. Comput. Ind. 142: 103741 (2022) - [j8]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control. IEEE Trans. Ind. Informatics 18(6): 3734-3743 (2022) - [c15]Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Guntur Dharma Putra, Raja Jurdak:
A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain. ICCCN 2022: 1-7 - [c14]Zahra Jadidi, Shantanu Pal, Nithesh Nayak K, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei:
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems. ICCCN 2022: 1-7 - [c13]Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks. INFOCOM Workshops 2022: 1-7 - [c12]Kathy Nguyen, Shantanu Pal, Zahra Jadidi, Ali Dorri, Raja Jurdak:
A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS. PerCom Workshops 2022: 261-266 - [c11]Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam:
Design and Development of Automated Threat Hunting in Industrial Control Systems. PerCom Workshops 2022: 618-623 - [c10]Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak:
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. TrustCom 2022: 1107-1114 - [c9]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. TrustCom 2022: 1522-1527 - [i9]Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam:
Design and Development of Automated Threat Hunting in Industrial Control Systems. CoRR abs/2202.01543 (2022) - [i8]Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks. CoRR abs/2205.00390 (2022) - [i7]Kealan Dunnett, Shantanu Pal, Zahra Jadidi:
Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing. CoRR abs/2205.03822 (2022) - [i6]Zahra Jadidi, Shantanu Pal, Nithesh Nayak K, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei:
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems. CoRR abs/2206.05678 (2022) - [i5]Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak:
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. CoRR abs/2208.12031 (2022) - [i4]Hejia Zhou, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments. CoRR abs/2209.13323 (2022) - 2021
- [j7]Zahra Jadidi, Yi Lu:
A Threat Hunting Framework for Industrial Control Systems. IEEE Access 9: 164118-164130 (2021) - [j6]Shantanu Pal, Zahra Jadidi:
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities. Sensors 21(20): 6832 (2021) - [c8]Gordon Haylett, Zahra Jadidi, Kien Nguyen Thanh:
System-Wide Anomaly Detection of Industrial Control Systems via Deep Learning and Correlation Analysis. AIAI 2021: 362-373 - [i3]Kathy Nguyen, Shantanu Pal, Zahra Jadidi, Ali Dorri, Raja Jurdak:
A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS. CoRR abs/2112.00262 (2021) - [i2]Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi:
Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives. CoRR abs/2112.08862 (2021) - 2020
- [c7]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. TrustCom 2020: 1920-1925 - [i1]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. CoRR abs/2010.07493 (2020)
2010 – 2019
- 2017
- [c6]Jun Jo, Zahra Jadidi, Bela Stantic:
A Drone-Based Building Inspection System Using Software-Agents. IDC 2017: 115-121 - [c5]Hu Li, Zahra Jadidi, Jinyan Chen, Jun Jo:
The Use of Machine Learning for Correlation Analysis of Sentiment and Weather Data. RiTA 2017: 291-298 - 2016
- [j5]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
A probabilistic sampling method for efficient flow-based analysis. J. Commun. Networks 18(5): 818-825 (2016) - [j4]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Intelligent Sampling Using an Optimized Neural Network. J. Networks 11(01): 16-27 (2016) - 2015
- [j3]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Performance of Flow-based Anomaly Detection in Sampled Traffic. J. Networks 10(9): 512-520 (2015) - [c4]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Flow-based anomaly detection using semisupervised learning. ICSPCS 2015: 1-5 - 2014
- [j2]Mansour Sheikhan, Zahra Jadidi:
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network. Neural Comput. Appl. 24(3-4): 599-611 (2014) - 2013
- [c3]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Metaheuristic algorithms based Flow Anomaly Detector. APCC 2013: 717-722 - [c2]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Mansour Sheikhan:
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm. ICDCS Workshops 2013: 76-81 - 2012
- [j1]Mansour Sheikhan, Zahra Jadidi, Ali Farrokhi:
Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. Appl. 21(6): 1185-1190 (2012) - 2010
- [c1]Morteza Analoui, Maedeh Beheshti, Maryam Tayefeh Mahmoudi, Zahra Jadidi:
Tecno-Streams approach for content-based image retrieval. NaBIC 2010: 109-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint