Seguir
gbadebo ayoade
gbadebo ayoade
Research Assistant University of Texas Dallas
Dirección de correo verificada de utdallas.edu
Título
Citado por
Citado por
Año
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment
G Ayoade, V Karande, L Khan, K Hamlen
IEEE International Conference on Information Reuse and Integration (IRI), 15 …, 2018
1892018
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
1152015
Automated Threat Report Classification over Multi-Source Data
G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham
2018 IEEE 4th International Conference on Collaboration and Internet Computing, 2018
532018
Multistream classification for cyber threat data with heterogeneous feature space
YF Li, Y Gao, G Ayoade, H Tao, L Khan, B Thuraisingham
The World Wide Web Conference, 2992-2998, 2019
302019
Secure data processing for IoT middleware systems
G Ayoade, A El-Ghamry, V Karande, L Khan, M Alrahmawy, RM Zakria
The Journal of Supercomputing, 2018
282018
Smart contract defense through bytecode rewriting
G Ayoade, E Bauman, L Khan, K Hamlen
2019 IEEE International Conference on Blockchain (Blockchain), 384-389, 2019
252019
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017
242017
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
162020
Evolving advanced persistent threat detection using provenance graph and metric learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
142020
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
132019
P2V: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
132015
Deception-enhanced threat sensing for resilient intrusion detection
F Araujo, G Ayoade, KW Hamlen, L Khan
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
42019
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
KA Akbar, Y Wang, G Ayoade, Y Gao, A Singhal, L Khan, ...
IEEE Transactions on Dependable and Secure Computing, 2022
32022
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
22021
A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem
H Hong, L Khan, G Ayoade, Z Shaohua, W Yong
IEEE International Conference on Information Reuse and Integration (IRI …, 2018
22018
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data
YF Li, Y Gao, G Ayoade, L Khan, A Singhal, B Thuraisingham
IEEE Transactions on Dependable and Secure Computing, 2022
12022
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
GG Ayoade
The University of Texas at Dallas, 2019
2019
IRI 2018
IC Anindya, M Kantarcioglu, R Bauder, T Khoshgoftaar, G Ayoade, ...
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–18