Skip to main content

Research Repository

Advanced Search

Outputs (50)

A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks (2017)
Journal Article
Sheykhkanloo, N. M. (2017). A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. International Journal of Cyber Warfare and Terrorism, 7(2), 16-41. https://doi.org/10.4018/ijcwt.2017040102

Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the sec... Read More about A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.

Introduction to Security Onion (2016)
Presentation / Conference Contribution
Heenan, R., & Moradpoor, N. (2016, May). Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes... Read More about Introduction to Security Onion.

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks (2015)
Journal Article
Moradpoor Sheykhkanloo, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of b... Read More about A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks.

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks (2013)
Journal Article
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013). IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks. Optical Switching and Networking, 10(4), 439-457. https://doi.org/10.1016/j.osn.2013.08.003

Optical and wireless technology integration has been proposed as one of the most promising nominees for the next-generation broadband access networks for quite some time. Integration scheme merges the high-speed and high-capacity of the optical netwo... Read More about IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.

Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET (2011)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2011). Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

The Ethernet Passive Optical Network (EPON) has been
considered as one of the most promising candidates for the nextgeneration
optical access solutions. In EPON, which is also
referred as the Time-Division-Multiplexed PON, upstream fibre
is share... Read More about Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

Reliability Analysis of Fault Tolerant Memory Systems
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.