gbadebo ayoade
gbadebo ayoade
Research Assistant University of Texas Dallas
Email confirmado em utdallas.edu
Título
Citado por
Citado por
Ano
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
832015
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment
G Ayoade, V Karande, L Khan, K Hamlen
IEEE International Conference on Information Reuse and Integration (IRI), 15 …, 2018
822018
P2V: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
122015
Multistream classification for cyber threat data with heterogeneous feature space
YF Li, Y Gao, G Ayoade, H Tao, L Khan, B Thuraisingham
The World Wide Web Conference, 2992-2998, 2019
112019
Secure data processing for IoT middleware systems
G Ayoade, A El-Ghamry, V Karande, L Khan, M Alrahmawy, RM Zakria
The Journal of Supercomputing, 2018
112018
Automated Threat Report Classification over Multi-Source Data
G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham
2018 IEEE 4th International Conference on Collaboration and Internet Computing, 2018
102018
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017
102017
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS, 1-10, 2020
72020
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
72019
Smart contract defense through bytecode rewriting
G Ayoade, E Bauman, L Khan, K Hamlen
2019 IEEE International Conference on Blockchain (Blockchain), 384-389, 2019
52019
Deception-enhanced threat sensing for resilient intrusion detection
F Araujo, G Ayoade, KW Hamlen, L Khan
Autonomous Cyber Deception, 147-165, 2019
52019
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
12020
A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem
H Hong, L Khan, G Ayoade, Z Shaohua, W Yong
IEEE International Conference on Information Reuse and Integration (IRI …, 2018
12018
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
2021
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
GG Ayoade
The University of Texas at Dallas, 2019
2019
IRI 2018
IC Anindya, M Kantarcioglu, R Bauder, T Khoshgoftaar, G Ayoade, ...
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–16