Follow
Erwin Adi
Erwin Adi
Deloitte Risk Advisory Pty Ltd
Verified email at deloitte.com.au
Title
Cited by
Cited by
Year
Machine learning and data analytics for the IoT
E Adi, A Anwar, Z Baig, S Zeadally
Neural computing and applications 32, 16205-16233, 2020
2512020
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
S Zeadally, E Adi, Z Baig, I Khan
IEEE Access 8, 2020
2142020
A new threat intelligence scheme for safeguarding industry 4.0 systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access 6, 32910-32924, 2018
1662018
Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
742018
Case study for restaurant queuing model
M Dharmawirya, E Adi
International Conference on Management and Artificial Intelligence, 52 - 55, 2011
692011
Harvesting real time traffic information from twitter
R Kosala, E Adi
Procedia Engineering 50, 1-11, 2012
612012
Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services
E Adi, Z Baig, P Hingston
Journal of Network and Computer Applications 91, 1-13, 2017
512017
Distributed denial-of-service attacks against http/2 services
E Adi, ZA Baig, P Hingston, CP Lam
Cluster Computing 19, 79-86, 2016
392016
Low-Rate Denial-of-Service Attacks against HTTP/2 Services
E Adi, Z Baig, CP Lam, P Hingston
The 5th International Conference on IT Convergence and Security, 2015
342015
Analysis of expected and actual waiting time in fast food restaurants
M Dharmawirya, H Oktadiana, E Adi
Industrial Engineering Letters 2 (5), 8 - 17, 2012
262012
AI-based audit of fuzzy front end innovation using ISO56002
R Khan, E Adi, O Hussain
Managerial Auditing Journal 36 (4), 564-590, 2021
172021
Investigating Login Features in Smartphone Apps
N Micallef, E Adi, G Misra
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
152018
Comparison of classification algorithms to tell bots and humans apart
CH Saputra, E Adi, S Revina
Journal of Next Generation Information Technology 4 (7), 23-32, 2013
142013
Gamification: Blood donor apps for IOS devices
AC Sabani, IBK Manuaba, E Adi
Journal of Games, Game Art, and Gamification 1 (1), 14-26, 2016
92016
A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting
E Adi
Procedia Engineering, 19-28, 2012
92012
Case study for restaurant queuing model
D Mathias, E Adi
International Conference on Management and Artificial Intelligence IPEDR 6, 2011
72011
Learn street skateboarding through 3D simulations of angle rotation
E Adi, IGMK Aditya, M Citrawati
Journal of Information Technology Education: Research 9 (1), 217-234, 2010
62010
Denial-of-service attack modelling and detection for HTTP/2 services
E Adi
Edith Cowan University, 2017
52017
Website Vulnerability to Session Fixation Attacks
B Nathani, E Adi
Journal of Information Engineering and Applications ISSN 2224-5782 (print …, 2012
52012
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
E Adi, Z Baig, S Zeadally
Applied Cybersecurity & Internet Governance 1 (1), 1-23, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20