Skip to main content

Publications

Selected publications

  1. A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments (Journal article - 2019)
  2. A Novel ML-Based Symbol Detection Pipeline for Molecular Communication (Journal article - 2023)
  3. Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems (Journal article - 2019)
  4. Detection and analysis of the Chameleon WiFi access point virus (Journal article - 2013)
What type of publication do you want to show?

2024

2023

Generating Synthetic Tabular Data for DDoS Detection Using Generative Models

Saka, S., Al-Ataby, A., & Selis, V. (2023). Generating Synthetic Tabular Data for DDoS Detection Using Generative Models. In 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 1436-1442). IEEE. doi:10.1109/trustcom60117.2023.00196

DOI
10.1109/trustcom60117.2023.00196
Conference Paper

2022

The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification

Alhajri, R., Marshall, A., Shen, G., López-Benítez, M., Selis, V., & Zhang, J. (2022). The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification. In 2022 International Conference on Artificial Intelligence of Things (ICAIoT) (pp. 1-6). IEEE. doi:10.1109/icaiot57170.2022.10121819

DOI
10.1109/icaiot57170.2022.10121819
Conference Paper

2021

2019

Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems

Selis, V., McGuiness, D. T., & Marshall, A. (2019). Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems. In PROCEEDINGS OF THE 6TH ACM INTERNATIONAL CONFERENCE ON NANOSCALE COMPUTING AND COMMUNICATION. doi:10.1145/3345312.3345471

DOI
10.1145/3345312.3345471
Conference Paper

2018

2017

A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications

Selis, V., & Marshall, A. (2017). A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications. In 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET). Retrieved from https://www.webofscience.com/

Conference Paper

2015

MEDA: A Machine Emulation Detection Algorithm

Selis, V., & Marshall, A. (2015). MEDA: A Machine Emulation Detection Algorithm. In 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4 (pp. 228-235). Retrieved from https://www.webofscience.com/

Conference Paper

2013

Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs

Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. In PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) (pp. 488-493). Retrieved from https://www.webofscience.com/

Conference Paper

Detection and analysis of the Chameleon WiFi access point virus

Milliken, J., Selis, V., & Marshall, A. (2013). Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, 2013(1). doi:10.1186/1687-417x-2013-2

DOI
10.1186/1687-417x-2013-2
Journal article

Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance

Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance. IEEE WIRELESS COMMUNICATIONS LETTERS, 2(5), 571-574. doi:10.1109/WCL.2013.072513.130428

DOI
10.1109/WCL.2013.072513.130428
Journal article

2012

The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system

Milliken, J., Yap, K. M., Marshall, A., & Selis, V. (2012). The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system. In IET International Conference on Wireless Communications and Applications (ICWCA 2012) (pp. 101). Institution of Engineering and Technology. doi:10.1049/cp.2012.2110

DOI
10.1049/cp.2012.2110
Conference Paper