Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Meetings
    • HotSoS Symposium
    • HCSS Conference
    • C3E Workshop
    • SCC Meeting
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Ebuka Nkoro
First name
Ebuka
Middle name
Chinaechetam
Last name
Nkoro
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M., & Kim, D.-S. (2024). Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity. In (pp. 832–837). http://doi.org/10.1109/ICAIIC60209.2024.10463374 (Original work published 2025)
View
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M., & Kim, D.-S. (2023). Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare. In (pp. 947–952). http://doi.org/10.1109/ICTC58733.2023.10392359 (Original work published 2025)
View
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M., & Kim, D.-S. (2022). Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology. In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (pp. 886–889).
View
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X