Æȷοì
Erwin Adi
Erwin Adi
Deloitte Risk Advisory Pty Ltd
deloitte.com.auÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32, 16205-16233, 2020
2392020
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
S Zeadally, E Adi, Z Baig, I Khan
IEEE Access 8, 2020
2032020
A new threat intelligence scheme for safeguarding industry 4.0 systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access 6, 32910-32924, 2018
1592018
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
732018
Case study for restaurant queuing model
M Dharmawirya, E Adi
International Conference on Management and Artificial Intelligence, 52 - 55, 2011
692011
Harvesting real time traffic information from twitter
R Kosala, E Adi
Procedia Engineering 50, 1-11, 2012
612012
Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
512017
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19, 79-86, 2016
392016
Low-Rate Denial-of-Service Attacks against HTTP/2 Services
E Adi, Z Baig, CP Lam, P Hingston
The 5th International Conference on IT Convergence and Security, 2015
342015
Analysis of expected and actual waiting time in fast food restaurants
M Dharmawirya, H Oktadiana, E Adi
Industrial Engineering Letters 2 (5), 8 - 17, 2012
262012
AI-based audit of fuzzy front end innovation using ISO56002
R Khan, E Adi, O Hussain
Managerial Auditing Journal 36 (4), 564-590, 2021
162021
Investigating Login Features in Smartphone Apps
N Micallef, E Adi, G Misra
Proceedings of the 2018 ACM International Joint Conference and 2018 ¡¦, 2018
142018
Comparison of classification algorithms to tell bots and humans apart
CH Saputra, E Adi, S Revina
Journal of Next Generation Information Technology 4 (7), 23-32, 2013
132013
Gamification: Blood donor apps for IOS devices
AC Sabani, IBK Manuaba, E Adi
Journal of Games, Game Art, and Gamification 1 (1), 14-26, 2016
92016
A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting
E Adi
Procedia Engineering, 19-28, 2012
92012
Case study for restaurant queuing model
D Mathias, E Adi
International Conference on Management and Artificial Intelligence IPEDR 6, 2011
72011
Learn street skateboarding through 3D simulations of angle rotation
E Adi, IGMK Aditya, M Citrawati
Journal of Information Technology Education: Research 9 (1), 217-234, 2010
62010
Denial-of-service attack modelling and detection for HTTP/2 services
E Adi
Edith Cowan University, 2017
52017
Website Vulnerability to Session Fixation Attacks
B Nathani, E Adi
Journal of Information Engineering and Applications ISSN 2224-5782 (print ¡¦, 2012
52012
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
E Adi, Z Baig, S Zeadally
Applied Cybersecurity & Internet Governance 1 (1), 1-23, 2022
42022
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20