Recent publications and articles in preparation
  1. W. Sowinski-Mydlarz, V. Vassilev and K. Ouazzane, Logical Analysis of Vulnerability in Banking Operations (in preparation).
  2. M. Lane, K. Mohamed, A. Naciscionis, A. Phipps and V. Vassilev. Beacon-Based Authentication for Voice-controlled Devices (in preparation).
  3. W. Sowinski-Mydlarz, V. Vassilev. Querying and Data Processing in Intelligent Systems based on Semantic Indexing (in preparation).
  4. K. Bataityte, V. Vassilev and J. Gill. Theory of Dynamic Behaviour in Description Logic (in preparation).
  5. Y Patel, K Ouazzane and V. Vassilev, Deep Learning for Fraud Detection in Online Banking, J. Neural Networks and Applications (2018, to appear).
  6. Y. Patel, K. Ouazzane, V. Vassilev and I. Faruqi, Keystroke Dynamics using Autoencoders, IEEE Conf. Biometrics, Los Angelos CA (2018, to appear).
  7. M. Afzal, K. Ouazzane and V. Vassilev, K-Nearest Neighbours Based Classifiers for Moving Object Trajectories Reconstruction, In Proc. Third Int. Conf. on Applications and Systems of Visual Paradigms VISUAL2018, Venice, 2018, pp. 7-12; ISBN: 9781612086477.
  8. P. Gasiorowski, V. Vassilev and K. Ouazzane, 3D Simulation-based Analysis of Individual and Group Dynamic Behaviour in Video Surveillance, In Proc. Third Int. Conf. on Applications and Systems of Visual Paradigms, Venice, 2018, pp. 1-6; ISBN: 9781612086477.
  9. M. Afzal, K. Ouazzane and V. Vassilev (2016). Incremental reconstruction of moving object trajectory, In: Proc. Int. Conf. on Visualization, Barcelona, 2016; ISBN: 978-1-61208-520-3.
  10. P. Gasiorowski, V. Vassilev and K. Ouazzane (2016). Simulation-based Visual Analysis of Individual and Group Dynamic Behavior. In: Proc. 20th International Conference on Image Processing, Computer Vision, & Pattern Recognition (IPCV'16), CSREA Press, 2016, pp. 303-309; ISBN 1601324421
  11. K.Ouazzane, M. Aigbodi, D. Mitchell, V. Vassilev, J. Li (2014), An Innovative Custom Cyber Security Solution for Protecting Enterprise and Corporates’ Assets, International Journal of E-Entrepreneurship and Innovation, pp. 53-64.
  12. D. Ratnayake, H. Kazemian, S. Yusuf (2014), Identification of Probe Request Attacks in WLANs using Neural Networks, Neural Computing and Applications journal, doi.10.1007/s00521-013-1478-8. Online Oct. 2013
  13. J. Cai and M. Ghebru (2013), An Experiment Environment for Teaching Ethical Hacking and Penetration Test at the Workshop on Cyber Security Pedagogy, Teaching and Learning in Higher Education, University of Warwick, April 19 2013.
  14. M. Aigbodi, K. Ouazzane, D. Mitchell, V. Vassilev and J. Li (2013) Defence in-depth for cyber security with custom anti-virus signature definition In: Proc. Third Conf. on Digital Information Processing and Communication (ICDIP2013), pp 150.
  15. N. Bajnaid, R. Benlamri, A. Pakstas and S. Salekzamankhani (2013), Software Quality Assurance Ontology: from Development to Evaluation. SEKE 2013: Proc. Of the 25th International Conference on Software Engineering and Knowledge Engineering, Boston, USA, 27-29 June 2013.
  16. H. Kazemian and S. Ahmed, Comparisons of machine learning techniques for detecting malicious Webpages, Expert Systems With Applications, DOI: 10.1016/j.eswa.2014.08.046, Vol. 42, Issue 3, pp. 1166-1177, Feb 2015.
  17. Heba M. Elhoseny, Hossam E. H. Ahmed, Alaa M. Abbas, H. Kazemian, Osama S. Faragallah, Sayed M. El-Rabaie, Fathi E. Abd El-Samie, ‘Chaotic Encryption of Images in the Fractional Fourier Transform Domain Using Different Modes of Operation’, Signal, Image and Video Processing journal, DOI 10.1007/s11760-013-0490-x, ISSN 1863-1703, vol. 7, issue 3, online 2nd June 2013.
  18. Ehab H. Elshazly, Mahmoud A. Ashour, El-sayed M. El-Rabaie, Alaaeldin M. Abbas, Fathi E. Abd El-Samie and H. Kazemian, ‘Secure Semi Blind Image Watermarking Using Fractional Fourier and Wavelet Transforms’, CiiT International Journal of Digital Image Processing. DOI: DIP062012011, vol. 4, no. 11, June 2012 Issue.
  19. Deepthi N. Ratnayake, Hassan Kazemian and Syed A. Yusuf  Improved Detection of Probe Request Attacks Using Neural Networks and Genetic Algorithm, SECRYPT 2012 - International Conference on Security and Cryptography, part of 9th International joint conference on e-business and telecommunications - Rome, pp. 345 – 350, 24th to 27th Jul 2012.
  20. Ehab H. Elshazly, Mahmoud A. Ashour, El-sayed M. El-Rabaie, Alaa M. Abbas, F. E. Abd El Samie, and H. Kazemian, ‘Secured Semi Blind Image Watermarking in Fractional Wavelet Domain’, submitted to the Eight International Conference on Computer Engineering & Systems – ICCES, 27th-29th Nov 2012.
  21. Ehab. H. Elshazly, Mahmoud A. Ashour, Elsayed M. Elrabaie, Alaaeldin  M. Abbas and H. Kazemian, An Efficient Fractional Fourier Transform Approach for Digital Image Watermarking, 29th National Radio Science Conference, (NRSC 2012), Cairo, Egypt, pp. 245-254, 10th 12th April 12.
Dr Vassilev presenting during Cyber ASAP Demo Day