gbadebo ayoade
gbadebo ayoade
Research Assistant University of Texas Dallas
Verified email at
Cited by
Cited by
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment
G Ayoade, V Karande, L Khan, K Hamlen
IEEE International Conference on Information Reuse and Integration (IRI), 15 …, 2018
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
Automated Threat Report Classification over Multi-Source Data
G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham
2018 IEEE 4th International Conference on Collaboration and Internet Computing, 2018
Multistream classification for cyber threat data with heterogeneous feature space
YF Li, Y Gao, G Ayoade, H Tao, L Khan, B Thuraisingham
The World Wide Web Conference, 2992-2998, 2019
Secure data processing for IoT middleware systems
G Ayoade, A El-Ghamry, V Karande, L Khan, M Alrahmawy, RM Zakria
The Journal of Supercomputing, 2018
Smart contract defense through bytecode rewriting
G Ayoade, E Bauman, L Khan, K Hamlen
2019 IEEE International Conference on Blockchain (Blockchain), 384-389, 2019
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
Evolving advanced persistent threat detection using provenance graph and metric learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
P2V: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
KA Akbar, Y Wang, G Ayoade, Y Gao, A Singhal, L Khan, ...
IEEE Transactions on Dependable and Secure Computing, 2022
Deception-enhanced threat sensing for resilient intrusion detection
F Araujo, G Ayoade, KW Hamlen, L Khan
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem
H Hong, L Khan, G Ayoade, Z Shaohua, W Yong
IEEE International Conference on Information Reuse and Integration (IRI …, 2018
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data
YF Li, Y Gao, G Ayoade, L Khan, A Singhal, B Thuraisingham
IEEE Transactions on Dependable and Secure Computing, 2022
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
GG Ayoade
The University of Texas at Dallas, 2019
IRI 2018
IC Anindya, M Kantarcioglu, R Bauder, T Khoshgoftaar, G Ayoade, ...
The system can't perform the operation now. Try again later.
Articles 1–18