Publications

(2020). Towards an Effective Zero-Day Attack Detection Using Outlier-Based Deep Learning Techniques. arXiv preprint arXiv:2006.15344.

(2020). Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study. arXiv preprint arXiv:2006.15340.

(2020). Leveraging Siamese Networks for One-Shot Intrusion Detection Model. arXiv preprint arXiv:2006.15343.

(2020). Interoperability and integration testing methods for IoT systems: a systematic mapping study. Software Engineering and Formal Methods.

(2020). Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. arXiv preprint arXiv:2006.11929.

(2020). Automatic annotation of subsea pipelines using deep learning. Sensors.

(2020). A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems. IEEE Access.

(2020). A security perspective on Unikernels. 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

(2019). Threat Modeling and Security Issues for the Internet of Things. 2019 Conference on Next Generation Computing Applications (NextComp).

(2019). Labelled network capture generation for anomaly detection. International Symposium on Foundations and Practice of Security.

(2019). From Cyber-Security Deception to Manipulation and Gratification Through Gamification. HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings.

(2019). Cyber-security internals of a skoda octavia vRS: A hands on approach. IEEE Access.

(2019). Augmented Reality Intelligent Lighting Smart Spaces. 2019 Conference on Next Generation Computing Applications (NextComp).

(2018). X. 509 certificate error testing. Proceedings of the 13th International Conference on Availability, Reliability and Security.

(2018). Mayall: a framework for desktop JavaScript auditing and post-exploitation analysis. Informatics.

(2018). Improving SIEM for critical SCADA water infrastructures using machine learning. Computer Security.

(2018). CryptoKnight: generating and modelling compiled cryptographic primitives. Information.

(2018). Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies. Electronics.

(2018). Augmented-reality computer-vision assisted disaggregated energy monitoring and iot control platform. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC).

(2018). An assessment of blockchain consensus protocols for the Internet of Things. 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC).

(2018). Air Quality Monitoring in Mauritius. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC).

(2018). A taxonomy of malicious traffic for intrusion detection systems. 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

(2018). A Spatio-temporal Entropy-based Approach for the Analysis of Cyber Attacks (Demo Paper). SIGSPATIAL ‘18: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems.

(2018). A human-centred model for network flow analysis. 2018 2nd Cyber Security in Networking Conference (CSNet).

(2018). A comprehensive view on quality characteristics of the iot solutions. EAI International Conference on IoT in Urban Space.

(2017). When eHealth meets the internet of things: Pervasive security and privacy challenges. 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security).

(2017). Trie compression for GPU accelerated multi-pattern matching. arXiv preprint arXiv:1702.03657.

(2017). Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv preprint arXiv:1701.02145.

(2017). Machine learning approach for detection of nontor traffic. Proceedings of the 12th International Conference on Availability, Reliability and Security.

(2017). Deep learning based cryptographic primitive classification. arXiv preprint arXiv:1709.08385.

(2017). Critical patient eHealth monitoring system using wearable sensors. 2017 1st International Conference on Next Generation Computing Applications (NextComp).

(2016). X-Secure: protecting users from big bad wolves. IEEE Emergitech 2016.

(2016). Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System. 3th International Symposium on Networks, Computers and Communications (ISNCC).

(2016). Strategies for protecting intellectual property when using CUDA applications on graphics processing units. Proceedings of the 9th International Conference on Security of Information and Networks.

(2016). Pervasive eHealth services a security and privacy risk awareness survey. 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA).

(2016). Managing knowledge flows in Mauritian multinational corporations: Empirical analysis using the SECI model. 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech).

(2016). Knowledge-based management systems for the police force. 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech).

(2016). Gesture based iot light control for smart clothing. 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech).

(2016). A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices. International Journal On Cyber Situational Awareness (IJCSA).

(2015). Data remanence and digital forensic investigation for CUDA graphics processing units. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

(2015). Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures. Wireless World Research Forum (WWRF).

(2014). Glop: Enabling massively parallel incident response through gpu log processing. Proceedings of the 7th International Conference on Security of Information and Networks.

(2014). A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems. Proceedings of the 7th International Conference on Security of Information and Networks.

(2013). Investigation of GPU-based pattern matching. The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2013).