First name
Ebuka
Middle name
Chinaechetam
Last name
Nkoro
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2024). Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity. In (pp. 832–837). http://doi.org/10.1109/ICAIIC60209.2024.10463374 (Original work published 2024)
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2023). Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare. In (pp. 947–952). http://doi.org/10.1109/ICTC58733.2023.10392359 (Original work published 2024)
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2022). Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology. In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (pp. 886–889).