Publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2023

  1. Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication
    Afia Anjum, Paul Agbaje, Arkajyoti Mitra, and 3 more authors
    Future Generation Computer Systems, 2023
  2. Deep Reinforcement Learning for Energy-Efficient Task Offloading in Cooperative Vehicular Edge Networks
    Paul Agbaje, Ebelechukwu Nwafor, and Habeeb Olufowobi
    In 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), 2023
  3. FedCime: An Efficient Federated Learning Approach For Clients in Mobile Edge Computing
    Paul Agbaje, Afia Anjum, Zahidur Talukder, and 3 more authors
    In 2023 IEEE International Conference on Edge Computing and Communications (EDGE), 2023

2022

  1. CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks
    Ebelechukwu Nwafor, and Habeeb Olufowobi
    In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2022
  2. A Survey of Machine Translation Tasks on Nigerian Languages
    Ebelechukwu Nwafor, and Anietie Andy
    In Proceedings of the Thirteenth Language Resources and Evaluation Conference, Jun 2022

2021

  1. Dynamic load sharing in memory constrained devices: a survey
    Ebelechukwu Nwafor, Michael Robson, and Habeeb Olufowobi
    In 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), Jun 2021
  2. Covid vaccine sentiment analysis by geographic region
    Ebelechukwu Nwafor, Ryan Vaughan, and Christopher Kolimago
    In 2021 IEEE International Conference on Big Data (Big Data), Jun 2021
  3. Detecting network traffic intrusions on memory constrained embedded systems
    Shiyu Su, and Ebelechukwu Nwafor
    In 2021 IEEE International Symposium on Technologies for Homeland Security (HST), Jun 2021

2019

  1. Towards an Interactive Visualization Framework for IoT Device Data Flow
    Ebelechukwu Nwafor, and Habeeb Olufowobi
    In , Jun 2019

2018

  1. Trace-based data provenance for cyber-physical systems
    Ebelechukwu Nwafor
    Howard University, Jun 2018
  2. Design patterns for the industrial Internet of Things
    Gedare Bloom, Bassma Alsulami, Ebelechukwu Nwafor, and 1 more author
    In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Jun 2018
  3. Anomaly-based intrusion detection of IoT device sensor data using provenance graphs
    Ebelechukwu Nwafor, Andre Campbell, and Gedare Bloom
    In 1st International Workshop on Security and Privacy for the Internet-of-Things, Jun 2018

2017

  1. Towards a provenance collection framework for internet of things devices
    Ebelechukwu Nwafor, Andre Campbell, David Hill, and 1 more author
    In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Jun 2017
  2. Towards a Provenance-Aware Internet of Things (IoT) System
    Ebelechukwu Nwafor
    Jun 2017

2016

  1. A policy-driven framework for document classification and enterprise security
    Ebelechukwu Nwafor, Pawan Chowdhary, and Anca Chandra
    In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Jun 2016

2015

  1. A Hybrid Approach to Improving Cloud Data Security
    E Nwafor, and L Burge
    In Proceedings of the International Conference on Security and Management (SAM), Jun 2015
  2. Cloud service security & application vulnerability
    Acklyn Murray, Geremew Begna, Ebelechukwu Nwafor, and 2 more authors
    In SoutheastCon 2015, Jun 2015
  3. Cloud service security & application vulnerability
    Acklyn Murray, Geremew Begna, Ebelechukwu Nwafor, and 2 more authors
    In SoutheastCon 2015, Jun 2015

2013

  1. A Self-Protecting Security Framework for CDA Documents
    G Hsieh, and E Nwafor
    In Proceedings of the International Conference on Security and Management (SAM), Jun 2013
  2. Lessons learned: Porting java applications to android
    G Hsieh, D Paruchuri, C Steward, and 2 more authors
    In Proceedings of the International Conference on Software Engineering Research and Practice (SERP), Jun 2013