Ebuka Nkoro
Title 1: Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology.
Target: ICTC 2022(Accepted).
Title 2: Real-Time QR Code License Plate Detection in Vehicles Using Pyzbar.
Target: KICS Fall 2022(Accepted).
Title 3: Performance Comparison of Kalman Filtering Approaches for Digital Twin-based Battery SoC Estimation JCCI 2023 (Accepted).
Title 4: Explainable Metaverse Ransomware Detection using SHAP (KICS Summer 2023).
Title 5: SHAP-Based Intrusion Detection Framework for Zero-Trust IoT Maritime Security ICMIC 2023 (Accepted).
Title 6: UDetect: Anonymous Network Traffic Classification in the Metaverse with Union Feature Selection-Winter Intensive 2022 (Reject).
Title 7: Zero-trust Identity Management for a Trustworthy Metaverse (Reject).
Title 8: Explainable Adversarial Mitigation for Zero-Trust Cyber Warfare -MILCOM (Reject).
Title 9: Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare ICTC 2023 (Accepted)
Title 10: Detecting Cyberthreats in Metaverse Learning Platforms using an Explainable DNN. IoT Journal (Decision in progress)
Title 11: XAI with Adversarial Defence for Zero-Trust Metaverse DDoS Attack Detection (UR. IEEE TDSC)
Title 12: Cyber-Chameleon: A Moving Target Defence Mechanism for Metaverse Cyberattacks-KICS Fall 2023 (Accepted)
Title 13: A Tiny and Explainable AI System for Darkweb Traffic Detection in IoT Networks (IEEE WCNC)
>>>>> Completed submission for KICS Fall 2023
>>>>> Completed Submission for WCNC Conference Submission
>>>>> Implemented codes for Quantization aware training for Tiny ML
>>>>> Complete Tiny ML codes
>>>>> Continue paper writing
AI for Service Drive
>>>>> Prophet 1 model results.
>>>>> Discussed Corrections from the Prophet 1 model results
>>>>> Re-Strategize Upsell subgroup roadmap.
>>>>> Employ the necessary model and training features for upselling.
Submit journal/conference papers
Address feedback from 2022 winter intensive paper
Experiment cloud based DT for HVAC data center monitoring
1.Study Digital Twins, Zero Trust Cybersecurity
2.Complete Three Journal Papers
3.Complete all approved Domestic Conference Papers
4.Complete all approved International Conferences
5.Build and deploy a digital twin application