default search action
Nitin Naik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Natthakan Iam-On, Tossapon Boongoen, Nitin Naik, Longzhi Yang:
Leveraging ensemble clustering for privacy-preserving data fusion: Analysis of big social-media data in tourism. Inf. Sci. 686: 121336 (2025) - [j10]Tonkla Maneerat, Natthakan Iam-On, Tossapon Boongoen, Khwunta Kirimasthong, Nitin Naik, Longzhi Yang, Qiang Shen:
Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training. Inf. Sci. 687: 121407 (2025) - 2024
- [e1]Nitin Naik, Paul Jenkins, Paul Grace, Longzhi Yang, Shaligram Prajapat:
Advances in Computational Intelligence Systems - Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6-8, 2023, Birmingham, UK. Advances in Intelligent Systems and Computing 1453, Springer 2024, ISBN 978-3-031-47507-8 [contents] - 2023
- [j9]Noe Elisa, Longzhi Yang, Fei Chao, Nitin Naik, Tossapon Boongoen:
A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity. IEEE Access 11: 8773-8789 (2023) - [j8]Mou Zhou, Changjing Shang, Guobin Li, Liang Shen, Nitin Naik, Shangzhu Jin, Jun Peng, Qiang Shen:
Transformation-Based Fuzzy Rule Interpolation With Mahalanobis Distance Measures Supported by Choquet Integral. IEEE Trans. Fuzzy Syst. 31(4): 1083-1097 (2023) - [j7]Longzhi Yang, Varadarajan Vijayakumar, Tossapon Boongoen, Nitin Naik:
Special issue on emerging trends, challenges and applications in cloud computing. Wirel. Networks 29(3): 985-987 (2023) - [c72]Dishita Naik, Nitin Naik:
An Introduction to Federated Learning: Working, Types, Benefits and Limitations. UKCI 2023: 3-17 - [c71]Dishita Naik, Nitin Naik:
The Changing Landscape of Machine Learning: A Comparative Analysis of Centralized Machine Learning, Distributed Machine Learning and Federated Machine Learning. UKCI 2023: 18-28 - [c70]Nitin Naik, Paul Jenkins, Paul Grace, Shaligram Prajapat, Dishita Naik, Jingping Song, Jian Xu, Ricardo M. Czekster:
Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack. UKCI 2023: 351-363 - [c69]Nitin Naik, Paul Jenkins, Paul Grace, Dishita Naik, Shaligram Prajapat, Jingping Song, Jian Xu, Ricardo M. Czekster:
Analysing Cyberattacks Using Attack Tree and Fuzzy Rules. UKCI 2023: 364-378 - [c68]Ishita Naik, Dishita Naik, Nitin Naik:
Artificial Intelligence (AI) Applications in Chemistry. UKCI 2023: 545-557 - [c67]Ishita Naik, Dishita Naik, Nitin Naik:
Demystifying the Working, Types, Benefits and Limitations of Chatbots. UKCI 2023: 558-566 - 2022
- [j6]Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. Comput. Secur. 120: 102808 (2022) - [c66]Nitin Naik, Paul Jenkins, Paul Grace:
Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack. UKCI 2022: 324-333 - 2021
- [j5]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy-import hashing: A static analysis technique for malware detection. Digit. Investig. 37: 301139 (2021) - [j4]Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen:
Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation. Expert Syst. J. Knowl. Eng. 38(5) (2021) - [j3]Kshirasagar Naik, Tejas Pandit, Nitin Naik, Parth Shah:
Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging. Sensors 21(3): 988 (2021) - [j2]Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen:
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. IEEE Trans. Emerg. Top. Comput. Intell. 5(6): 893-907 (2021) - [c65]Nitin Naik:
Demystifying Properties of Distributed Systems. ISSE 2021: 1-8 - [c64]Nitin Naik:
Comprehending Concurrency and Consistency in Distributed Systems. ISSE 2021: 1-6 - [c63]Nitin Naik, Paul Jenkins:
Does Sovrin Network Offer Sovereign Identity? ISSE 2021: 1-6 - [c62]Nitin Naik, Paul Jenkins:
Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology. ISSE 2021: 1-7 - [c61]Nitin Naik, Paul Grace, Paul Jenkins:
An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity. SSCI 2021: 1-8 - [c60]Nitin Naik:
Performance Evaluation of Distributed Systems in Multiple Clouds using Docker Swarm. SysCon 2021: 1-6 - [c59]Nitin Naik:
Fuzzy Intelligent System for Improving High Availability of a Docker-Based Hybrid Cloud Infrastructure. UKCI 2021: 38-50 - [c58]Nitin Naik:
Cloud-Agnostic and Lightweight Big Data Processing Platform in Multiple Clouds Using Docker Swarm and Terraform. UKCI 2021: 519-531 - 2020
- [c57]Nitin Naik, Paul Jenkins:
Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity. BESC 2020: 1-6 - [c56]Noe Elisa, Longzhi Yang, Fei Chao, Nitin Naik:
A Comparative Study of Genetic Algorithm and Particle Swarm optimisation for Dendritic Cell Algorithm. CEC 2020: 1-8 - [c55]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy-Import Hashing: A Malware Analysis Approach. FUZZ-IEEE 2020: 1-8 - [c54]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song:
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis. FUZZ-IEEE 2020: 1-7 - [c53]Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano, Parth Shah, Nitin Naik:
A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices. ISSE 2020: 1-8 - [c52]Nitin Naik, Paul Jenkins:
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. ISSE 2020: 1-6 - [c51]Nitin Naik, Paul Jenkins:
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. ISSE 2020: 1-7 - [c50]Nitin Naik, Paul Jenkins:
Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. MobileCloud 2020: 90-95 - [c49]Noe Elisa, Longzhi Yang, Fei Chao, Nitin Naik:
Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System. SoCPaR 2020: 858-867 - [c48]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging. SSCI 2020: 1138-1145 - [c47]Nitin Naik, Paul Jenkins, Roger Cooke, Jonathan Gillett, Yaochu Jin:
Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. SSCI 2020: 1146-1153 - [i1]Noe Elisa, Longzhi Yang, Honglei Li, Fei Chao, Nitin Naik:
Consortium Blockchain for Security and Privacy-Preserving in E-government Systems. CoRR abs/2006.14234 (2020)
2010 – 2019
- 2019
- [c46]Nitin Naik, Paul Jenkins:
Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development. CoG 2019: 1-4 - [c45]Nitin Naik, Paul Jenkins, David Newell:
Learning Agile Scrum Methodology Using the Groupware Tool Trello $$^{\textregistered }$$ Through Collaborative Working. CISIS 2019: 343-355 - [c44]Noe Elisa, Longzhi Yang, Xin Fu, Nitin Naik:
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection. FUZZ-IEEE 2019: 1-6 - [c43]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang:
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules. FUZZ-IEEE 2019: 1-6 - [c42]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang:
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering. FUZZ-IEEE 2019: 1-6 - [c41]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall. FUZZ-IEEE 2019: 1-6 - [c40]Zheming Zuo, Jie Li, Bo Wei, Longzhi Yang, Fei Chao, Nitin Naik:
Adaptive Activation Function Generation for Artificial Neural Networks through Fuzzy Inference with Application in Grooming Text Categorisation. FUZZ-IEEE 2019: 1-6 - [c39]Nitin Naik, Paul Jenkins:
A Web Based Method for Managing PRINCE2® Projects Using Trello®. ISSE 2019: 1-3 - [c38]Nitin Naik, Paul Jenkins, Nick Savage:
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems. ISSE 2019: 1-6 - [c37]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song:
Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging. SSCI 2019: 625-632 - [c36]Nitin Naik, Paul Jenkins, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song:
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering. SSCI 2019: 641-648 - [c35]Nitin Naik, Qiang Shen:
Integration of Interpolation and Inference with Multi-antecedent Rules. UKCI 2019: 377-391 - 2018
- [j1]Nitin Naik, Ren Diao, Qiang Shen:
Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection. IEEE Trans. Fuzzy Syst. 26(4): 1878-1892 (2018) - [c34]Noe Elisa, Longzhi Yang, Nitin Naik:
Dendritic Cell Algorithm with Optimised Parameters Using Genetic Algorithm. CEC 2018: 1-8 - [c33]Nitin Naik, Paul Jenkins:
A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots. FUSION 2018: 904-910 - [c32]Nitin Naik, Paul Jenkins, Roger Cooke, Longzhi Yang:
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots. FUZZ-IEEE 2018: 1-8 - [c31]Nitin Naik, Paul Jenkins, Brian Kerby, Joseph Sloane, Longzhi Yang:
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls. FUZZ-IEEE 2018: 1-8 - [c30]Zheming Zuo, Jie Li, Philip Anderson, Longzhi Yang, Nitin Naik:
Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification. FUZZ-IEEE 2018: 1-8 - [c29]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation. HPCC/SmartCity/DSS 2018: 1520-1527 - [c28]Nitin Naik, Paul Jenkins, Nick Savage:
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis. SSCI 2018: 623-630 - [c27]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation. SSCI 2018: 1731-1738 - 2017
- [c26]David Ball, Nitin Naik, Paul Jenkins:
Lightweight and Cost-Effective Spectrum Analyser Based on Software Defined Radio and Raspberry Pi. EMS 2017: 260-266 - [c25]Nitin Naik, Ren Diao, Changjing Shang, Qiang Shen, Paul Jenkins:
D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall. FUZZ-IEEE 2017: 1-6 - [c24]Nitin Naik, Paul Jenkins, Roger Cooke, David Ball, Arthur Foster, Yaochu Jin:
Augmented windows fuzzy firewall for preventing denial of service attack. FUZZ-IEEE 2017: 1-6 - [c23]Nitin Naik, Paul Jenkins, David Newell:
Choice of suitable Identity and Access Management standards for mobile computing and communication. ICT 2017: 1-6 - [c22]David Ball, Nitin Naik, Paul Jenkins:
Small scale mobile energy management system using Raspberry Pi and Python. ISSPIT 2017: 139-143 - [c21]Nitin Naik, Paul Jenkins:
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. RCIS 2017: 163-174 - [c20]Nitin Naik:
Software CROWD-sourcing. RCIS 2017: 463-464 - 2016
- [c19]Nitin Naik, Paul Jenkins, Philip Davies, David Newell:
Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. CIT 2016: 219-225 - [c18]Nitin Naik, Paul Jenkins:
Enhancing Windows Firewall Security Using Fuzzy Reasoning. DASC/PiCom/DataCom/CyberSciTech 2016: 263-269 - [c17]Nitin Naik, Paul Jenkins:
An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. DASC/PiCom/DataCom/CyberSciTech 2016: 428-431 - [c16]Nitin Naik, Ren Diao, Qiang Shen:
Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort. FUZZ-IEEE 2016: 78-85 - [c15]Nitin Naik, Paul Jenkins:
Fuzzy reasoning based Windows Firewall for preventing denial of service attack. FUZZ-IEEE 2016: 759-766 - [c14]Nitin Naik, Paul Jenkins:
Web protocols and challenges of Web latency in the Web of Things. ICUFN 2016: 845-850 - [c13]Nitin Naik:
Building a virtual system of systems using docker swarm in multiple clouds. ISSE 2016: 1-3 - [c12]Nitin Naik:
Connecting google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere. ISSE 2016: 1-6 - [c11]Nitin Naik:
Flooded streets - A crowdsourced sensing system for disaster response: A case study. ISSE 2016: 1-3 - [c10]Nitin Naik:
Migrating from Virtualization to Dockerization in the Cloud: Simulation and Evaluation of Distributed Systems. MESOCA 2016: 1-8 - [c9]Nitin Naik, Paul Jenkins:
A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. MobileCloud 2016: 89-90 - [c8]Nitin Naik:
Crowdsourcing, Open-Sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis. SOSE 2016: 380-385 - [c7]Nitin Naik:
Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm. SSCI 2016: 1-7 - [c6]Nitin Naik, Paul Jenkins, Nick Savage, Vasilios Katos:
Big data security analysis approach using Computational Intelligence techniques in R for desktop users. SSCI 2016: 1-8 - 2015
- [c5]Nitin Naik:
Fuzzy Inference Based Intrusion Detection System: FI-Snort. CIT/IUCC/DASC/PICom 2015: 2062-2067 - [c4]Nitin Naik, Ren Diao, Qiang Shen:
Choice of effective fitness functions for genetic algorithm-aided dynamic fuzzy rule interpolation. FUZZ-IEEE 2015: 1-8 - 2014
- [c3]Nitin Naik, Ren Diao, Qiang Shen:
Genetic algorithm-aided dynamic fuzzy rule interpolation. FUZZ-IEEE 2014: 2198-2205 - 2013
- [c2]Nitin Naik, Ren Diao, Chai Quek, Qiang Shen:
Towards dynamic fuzzy rule interpolation. FUZZ-IEEE 2013: 1-7 - 2012
- [c1]Nitin Naik, Pan Su, Qiang Shen:
Integration of interpolation and inference. UKCI 2012: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint