Report

Ebuka94

August 21, 2023 - August 27, 2023

Papers

Ebuka Nkoro

Title 1: Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology.
Target: ICTC 2022(Accepted).

Title 2: Real-Time QR Code License Plate Detection in Vehicles Using Pyzbar.
Target: KICS Fall 2022(Accepted).

Title 3: Performance Comparison of Kalman Filtering Approaches for Digital Twin-based Battery SoC Estimation JCCI 2023 (Accepted).

Title 4: Explainable Metaverse Ransomware Detection using SHAP (KICS Summer 2023).

Title 5: SHAP-Based Intrusion Detection Framework for Zero-Trust IoT Maritime Security ICMIC 2023 (Accepted).

Title 6: UDetect: Anonymous Network Traffic Classification in the Metaverse with Union Feature Selection-Winter Intensive 2022 (Reject).

Title 7: Zero-trust Identity Management for a Trustworthy Metaverse (Reject).

Title 8: Explainable Adversarial Mitigation for Zero-Trust Cyber Warfare -MILCOM (Reject).

Title 9: Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare ICTC 2023 (Summited)

Title 10: Detecting Cyberthreats in Metaverse Learning Platforms using an Explainable DNN. IoT Journal (Required Reviews Completed)

Title 11: XAI-based Adversarial Protection for Zero-Trust Metaverse DDoS Attack Detection (Summer Intensive ---Processing).

75% Progress
Last Week's Progress

Proof reading of Summer intensive paper and codes

Implementing rejection comments to new manuscript

This Week Todo's

Present Summer Intensive

Present Oral ICMIC Virtual conference

Project Progress

Metaverse and Digital Twin Assisted Battery Pack Management

40% Progress
Last Week's Project

Collected Car upselling Dataset

Performed Data exploratory analysis of the dataset

This Week's Project

Expand the exploratory data analysis further and

Complete tasks assigned by project leader

Monthly Goals

Submit journal / Summer Intensive paper

Address feedback from 2022 winter intensive paper

Experiment cloud based DT for HVAC data center monitoring

Annual Goals

1.Study Digital Twins, Realtime Cybersecurity Tools

2.Complete Three Journal Papers

3.Complete all approved Domestic Conference Papers

4.Complete all approved International Conferences

5.Build and deploy a digital twin application