


default search action
Hassan Wasswa
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[i17]Hassan Wasswa, Hussein A. Abbass, Timothy Lynar:
How the Graph Construction Technique Shapes Performance in IoT Botnet Detection. CoRR abs/2603.06654 (2026)- 2025
[j2]Hassan Wasswa
, Hussein A. Abbass
, Timothy Lynar:
ResDNViT: A hybrid architecture for Netflow-based attack detection using a residual dense network and Vision Transformer. Expert Syst. Appl. 282: 127504 (2025)
[j1]Hassan Wasswa
, Hussein A. Abbass, Timothy Lynar:
Latent space alignment for robust detection of IoT botnet attacks in non-stationary environments. Knowl. Based Syst. 330: 114749 (2025)
[i16]Aziida Nanyonga
, Hassan Wasswa
, Ugur Turhan, Keith F. Joiner, Graham Wild:
Comparative Analysis of Topic Modeling Techniques on ATSB Text Narratives Using Natural Language Processing. CoRR abs/2501.01227 (2025)
[i15]Aziida Nanyonga
, Hassan Wasswa
, Graham Wild:
Comparative Study of Deep Learning Architectures for Textual Damage Level Classification. CoRR abs/2501.01694 (2025)
[i14]Aziida Nanyonga, Hassan Wasswa
, Ugur Turhan, Oleksandra Molloy, Graham Wild:
Sequential Classification of Aviation Safety Occurrences with Natural Language Processing. CoRR abs/2501.06490 (2025)
[i13]Aziida Nanyonga
, Hassan Wasswa
, Oleksandra Molloy, Ugur Turhan, Graham Wild:
Natural Language Processing and Deep Learning Models to Classify Phase of Flight in Aviation Safety Occurrences. CoRR abs/2501.06564 (2025)
[i12]Aziida Nanyonga
, Hassan Wasswa
, Graham Wild:
Aviation Safety Enhancement via NLP & Deep Learning: Classifying Flight Phases in ATSB Safety Reports. CoRR abs/2501.07923 (2025)
[i11]Aziida Nanyonga, Hassan Wasswa
, Ugur Turhan, Keith F. Joiner, Graham Wild:
Exploring Aviation Incident Narratives Using Topic Modeling and Clustering Techniques. CoRR abs/2501.07924 (2025)
[i10]Aziida Nanyonga
, Hassan Wasswa
, Graham Wild:
Phase of Flight Classification in Aviation Safety using LSTM, GRU, and BiLSTM: A Case Study with ASN Dataset. CoRR abs/2501.07925 (2025)
[i9]Hassan Wasswa
, Aziida Nanyonga, Timothy Lynar:
Impact of Latent Space Dimension on IoT Botnet Detection Performance: VAE-Encoder Versus ViT-Encoder. CoRR abs/2504.14879 (2025)
[i8]Hassan Wasswa
, Timothy Lynar, Aziida Nanyonga, Hussein Abbass:
IoT Botnet Detection: Application of Vision Transformer to Classification of Network Flow Traffic. CoRR abs/2504.18781 (2025)
[i7]Hassan Wasswa
, Aziida Nanyonga, Timothy Lynar:
Preserving Seasonal and Trend Information: A Variational Autoencoder-Latent Space Arithmetic Based Approach for Non-stationary Learning. CoRR abs/2504.18819 (2025)
[i6]Hassan Wasswa
, Timothy Lynar, Hussein A. Abbass:
Enhancing IoT-Botnet Detection using Variational Auto-encoder and Cost-Sensitive Learning: A Deep Learning Approach for Imbalanced Datasets. CoRR abs/2505.01437 (2025)
[i5]Hassan Wasswa
, Hussein A. Abbass, Timothy Lynar:
Graph Attention Neural Network for Botnet Detection: Evaluating Autoencoder, VAE and PCA-Based Dimension Reduction. CoRR abs/2505.17357 (2025)
[i4]Hassan Wasswa
, Hussein A. Abbass, Timothy Lynar:
Are GNNs Worth the Effort for IoT Botnet Detection? A Comparative Study of VAE-GNN vs. ViT-MLP and VAE-MLP Approaches. CoRR abs/2505.17363 (2025)
[i3]Hassan Wasswa
, Hussein Abbass, Timothy Lynar:
A Quantized VAE-MLP Botnet Detection Model: A Systematic Evaluation of Quantization-Aware Training and Post-Training Quantization Strategies. CoRR abs/2511.03201 (2025)
[i2]Hassan Wasswa, Timothy Lynar:
Toward Real-World IoT Security: Concept Drift-Resilient IoT Botnet Detection via Latent Space Representation Learning and Alignment. CoRR abs/2512.22488 (2025)- 2024
[i1]Aziida Nanyonga
, Hassan Wasswa
, Graham Wild:
Topic Modeling Analysis of Aviation Accident Reports: A Comparative Study between LDA and NMF Models. CoRR abs/2403.04788 (2024)- 2022
[c3]Hassan Wasswa
, Abdul Serwadda:
The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls. IWSPA@CODASPY 2022: 46-54
[c2]Gustavo Casqueiro, Sayed Erfan Arefin
, Tasnia Heya Ashrafi, Abdul Serwadda, Hassan Wasswa
:
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability. TPS-ISA 2022: 160-167- 2020
[c1]Yuzhan Ma, Hamid Abdullah Jalab, Hassan Wasswa
, Ding Fan, Minjin Ma:
Recaptured Image Forensics Based on Image Illumination and Texture Features. ICVIP 2020: 93-97
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-09 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







