A computational intelligence enabled honeypot for chasing ghosts in the wires
N Naik, P Jenkins, N Savage, L Yang
Complex & Intelligent Systems 7 (1), 477-494
D-FRI-Honeypot: A secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation
N Naik, C Shang, P Jenkins, Q Shen
IEEE Transactions on Emerging Topics in Computational Intelligence
Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation
N Naik, C Shang, P Jenkins, Q Shen
Expert Systems, e12557
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ...
Complex & Intelligent Systems 7 (2), 687-702
Fuzzy-import hashing: A static analysis technique for malware detection
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
Forensic Science International: Digital Investigation 37, 301139
Small scale mobile energy management system using Raspberry Pi and Python
D Ball, N Naik, P Jenkins
2017 IEEE International Symposium on Signal Processing and Information …
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6
Fuzzy hashing aided enhanced YARA rules for malware triaging
N Naik, P Jenkins, N Savage, L Yang, K Naik, J Song, T Boongoen, ...
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1138-1145
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity
N Naik, P Jenkins
2020 7th International Conference on Behavioural and Social Computing (BESC)