A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks
Conference Proceeding
Moradpoor, N. (2014)
A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks. In Proceedings of the 2013 2nd International Workshop on Optical Wireless Communications (IWOW)doi:10.1109/iwow.2013.6777781
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques
Conference Proceeding
Sheykhkanloo, N. M. (2015)
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. In SIN '15 Proceedings of the 8th International Conference on Security of Information and Networkshttps://doi.org/10.1145/2799979.2800011
Structured Query Language injection (SQLi) attack is a code injection technique where malicious SQL statements are inserted into a given SQL database by simply using a web bro...
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...
Employing Neural Networks for the Detection of SQL Injection Attack
Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...
A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks
Conference Proceeding
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013)
A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. In 2013 5th Proceedings of the Computer Science and Electronic Engineering Conference (CEEC 2013)doi:10.1109/ceec.2013.6659439
Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless ...
Employing machine learning techniques for detection and classification of phishing emails
Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018)
Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases
Conference Proceeding
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit
communities dedicated to discussing British politics.We analyse the
popular sources favoured by each communit...
A survey of Intrusion Detection System technologies
Conference Proceeding
Heenan, R., & Moradpoor, N. (2016)
A survey of Intrusion Detection System technologies. In PGCS 2016: The First Post Graduate Cyber Security Symposium – The Cyber Academy
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performa...
Real-Time Data Analytics in Support of Network Resource Management Protocols
Conference Proceeding
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...