Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
geoffrey e hinton
Andrew B. Ross
George Gross
Claudia Calabrese
Hao Mao
Peter Malec
Chen Ma
Antonio Restivo
Radu Timofte
Kuanrui Yin
Home
/
Author
/
IAN S. WELCH
Author Info
Open Visualization
Name
Affiliation
Papers
IAN S. WELCH
Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
37
Collaborators
Citations
PageRank
64
120
18.53
Referers
Referees
References
238
513
242
Search Limit
100
513
Publications (37 rows)
Collaborators (64 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Autoencoder-based feature construction for IoT attacks clustering
1
0.36
2022
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification
0
0.34
2022
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
0
0.34
2022
Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599]
0
0.34
2022
Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT
0
0.34
2021
Achieving IoT Devices Secure Sharing in Multi-User Smart Space
0
0.34
2020
IoT Attacks: Features Identification and Clustering
0
0.34
2020
A survey on the architecture, application, and security of software defined networking: Challenges and open issues
0
0.34
2020
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
0
0.34
2020
How do they find us? A study of geolocation tracking techniques of malicious web sites
0
0.34
2020
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity Workflow.
0
0.34
2019
Automatic Device Selection And Access Policy Generation Based On User Preference For Iot Activity Workflow
0
0.34
2019
Geolocation Tracking and Cloaking of Malicious Web Sites
0
0.34
2019
Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network.
1
0.36
2018
Impacts of Power Factor Control Schemes in Time Series Power Flow Analysis for Centralized PV Plants Using Wavelet Variability Model.
0
0.34
2017
Learning Under Data Shift for Domain Adaptation: A Model-Based Co-clustering Transfer Learning Solution.
1
0.36
2016
Novel Features for Web Spam Detection
0
0.34
2016
Towards SDN Network Proofs — Taming a Complex System
0
0.34
2016
Empirical Analysis Of Impact Of Http Referer On Malicious Website Behaviour And Delivery
0
0.34
2016
Application Of Hazop To The Design Of Cyber Security Experiments
0
0.34
2016
A Machine Learning Based Web Spam Filtering Approach
4
0.46
2016
Co-clustering for Dual Topic Models.
1
0.34
2016
Measurement of IP and network tracking behaviour of malicious websites.
0
0.34
2016
Visraid: Visualizing Remote Access For Intrusion Detection
1
0.35
2015
YALIH, yet another low interaction honeyclient
4
0.40
2014
A Novel Scoring Model to Detect Potential Malicious Web Pages
2
0.40
2012
The effect of user interface delay in thin client mobile games
0
0.34
2010
Remotely shooting asteroids on our mobile phone
1
0.37
2009
Intrusion-Tolerant Middleware: The Road to Automatic Security
40
1.95
2006
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture
10
0.77
2004
Re-engineering Security as a Crosscutting Concern
2
0.43
2003
Using reflection as a mechanism for enforcing security policies on compiled code
13
0.86
2002
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
9
0.74
2000
Kava - a powerful and portable reflective Java (poster session)
0
0.34
2000
Supporting Real World Security Models in Java
7
0.81
1999
Runtime Implementation of Aspects Using Kava
0
0.34
1999
From Dalang to Kava - The Evolution of a Reflective Java Extension
23
2.47
1999
1