Theo dõi
gbadebo ayoade
gbadebo ayoade
Research Assistant University of Texas Dallas
Email được xác minh tại utdallas.edu
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment
G Ayoade, V Karande, L Khan, K Hamlen
IEEE International Conference on Information Reuse and Integration (IRI), 15 …, 2018
2142018
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
1262015
Automated Threat Report Classification over Multi-Source Data
G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham
2018 IEEE 4th International Conference on Collaboration and Internet Computing, 2018
682018
Secure data processing for IoT middleware systems
G Ayoade, A El-Ghamry, V Karande, L Khan, M Alrahmawy, RM Zakria
The Journal of Supercomputing, 2018
342018
Smart contract defense through bytecode rewriting
G Ayoade, E Bauman, L Khan, K Hamlen
2019 IEEE International Conference on Blockchain (Blockchain), 384-389, 2019
322019
Multistream classification for cyber threat data with heterogeneous feature space
YF Li, Y Gao, G Ayoade, H Tao, L Khan, B Thuraisingham
The world wide web conference, 2992-2998, 2019
322019
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International conference on big data (Big Data), 1830-1839, 2017
292017
Evolving advanced persistent threat detection using provenance graph and metric learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE conference on communications and network security (CNS), 1-9, 2020
242020
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
172020
Advanced persistent threat detection using data provenance and metric learning
KA Akbar, Y Wang, G Ayoade, Y Gao, A Singhal, L Khan, ...
IEEE Transactions on Dependable and Secure Computing 20 (5), 3957-3969, 2022
162022
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
152019
P2V: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
132015
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
42021
Deception-enhanced threat sensing for resilient intrusion detection
F Araujo, G Ayoade, KW Hamlen, L Khan
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
32019
A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem
H Hong, L Khan, G Ayoade, Z Shaohua, W Yong
IEEE International Conference on Information Reuse and Integration (IRI …, 2018
22018
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data
YF Li, Y Gao, G Ayoade, L Khan, A Singhal, B Thuraisingham
IEEE Transactions on Dependable and Secure Computing 21 (1), 1-11, 2022
12022
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
GG Ayoade
The University of Texas at Dallas, 2019
2019
IRI 2018
IC Anindya, M Kantarcioglu, R Bauder, T Khoshgoftaar, G Ayoade, ...
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–18