Mamoun Alazab
#122,915
Most Influential Person Now
Computer scientist
Mamoun Alazab's AcademicInfluence.com Rankings
Mamoun Alazabcomputer-science Degrees
Computer Science
#5025
World Rank
#5310
Historical Rank
Database
#2193
World Rank
#2307
Historical Rank
Download Badge
Computer Science
Mamoun Alazab's Degrees
- PhD Computer Science University of South Australia
- Masters Computer Science University of South Australia
- Bachelors Computer Science University of South Australia
Similar Degrees You Can Earn
Why Is Mamoun Alazab Influential?
(Suggest an Edit or Addition)Mamoun Alazab's Published Works
Published Works
- Deep Learning Approach for Intelligent Intrusion Detection System (2019) (645)
- Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey (2020) (238)
- Blockchain for Industry 4.0: A Comprehensive Review (2020) (234)
- Robust Intelligent Malware Detection Using Deep Learning (2019) (228)
- Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures (2011) (196)
- A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU (2020) (194)
- IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture (2020) (190)
- An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture (2020) (186)
- Early Detection of Diabetic Retinopathy Using PCA-Firefly Based Deep Learning Model (2020) (171)
- A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU (2020) (167)
- Image-Based malware classification using ensemble of CNN architectures (IMCEC) (2020) (162)
- Towards Understanding Malware Behaviour by the Extraction of API Calls (2010) (155)
- Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime (2014) (150)
- A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities (2020) (144)
- An ensemble machine learning approach through effective feature extraction to classify fake news (2021) (140)
- Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT (2020) (134)
- Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges (2020) (131)
- Profiling and classifying the behavior of malicious codes (2015) (127)
- A hybrid deep learning image-based analysis for effective malware detection (2019) (119)
- Hybrids of support vector machine wrapper and filter based framework for malware detection (2016) (113)
- Intelligent mobile malware detection using permission requests and API calls (2020) (112)
- Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System (2021) (110)
- Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices (2021) (109)
- Whale Optimization Algorithm With Applications to Resource Allocation in Wireless Networks (2020) (108)
- CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU (2021) (99)
- Hand gesture classification using a novel CNN-crow search algorithm (2021) (99)
- Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV (2020) (95)
- A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid (2020) (93)
- Use of Data Visualisation for Zero-Day Malware Detection (2018) (92)
- PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare (2022) (92)
- A Comprehensive Survey for Intelligent Spam Email Detection (2019) (90)
- Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment (2020) (87)
- A Comparative Analysis of Distributed Ledger Technology Platforms (2019) (86)
- A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks (2020) (86)
- Smart Secure Sensing for IoT-Based Agriculture: Blockchain Perspective (2021) (84)
- A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing (2019) (83)
- Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies (2019) (79)
- An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers (2019) (76)
- The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems (2020) (72)
- Machine Learning Based Botnet Identification Traffic (2016) (70)
- Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities (2021) (69)
- Fast authentication in wireless sensor networks (2016) (68)
- Cybercrime: The Case of Obfuscated Malware (2011) (68)
- Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data (2019) (66)
- Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions (2022) (63)
- An Improved Convolutional Neural Network Model for Intrusion Detection in Networks (2019) (59)
- Network Flow based IoT Botnet Attack Detection using Deep Learning (2020) (57)
- Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace (2021) (57)
- Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction (2020) (57)
- A review on deep learning for future smart cities (2020) (56)
- On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT (2021) (55)
- Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT (2020) (55)
- A Hybrid Wrapper-Filter Approach for Malware Detection (1969) (52)
- Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges (2020) (51)
- Optimal 5G network slicing using machine learning and deep learning concepts (2021) (51)
- Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics (2021) (50)
- Sum-Rate Maximization for UAV-Assisted Visible Light Communications Using NOMA: Swarm Intelligence Meets Machine Learning (2020) (50)
- Mining Malware to Detect Variants (2014) (50)
- Malicious Spam Emails Developments and Authorship Attribution (2013) (48)
- From ZeuS to Zitmo: Trends in Banking Malware (2015) (47)
- Spam and Criminal Activity (2015) (47)
- Stochastic Neural Networks for Cryptocurrency Price Prediction (2020) (47)
- Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets (2020) (45)
- Decentralized Accessibility of e-commerce Products through Blockchain Technology (2020) (44)
- Interval type 2 trapezoidal‐fuzzy weighted with zero inconsistency combined with VIKOR for evaluating smart e‐tourism applications (2021) (44)
- A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control (2021) (44)
- Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan (2013) (43)
- Multidimensional benchmarking of the active queue management methods of network congestion control based on extension of fuzzy decision by opinion score method (2020) (42)
- A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network (2020) (42)
- Penetration testing framework for smart contract Blockchain (2020) (41)
- A lightweight IoT‐based security framework for inventory automation using wireless sensor network (2019) (40)
- Towards a Feature Rich Model for Predicting Spam Emails containing Malicious Attachments and URLs (2014) (39)
- IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges (2020) (39)
- Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses (2021) (38)
- Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS (2021) (38)
- ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City (2019) (37)
- EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE (2009) (37)
- Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning (2021) (37)
- Deep Learning Applications for Cyber Security (2019) (37)
- Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET (2020) (37)
- Machine Learning Assisted Information Management Scheme in Service Concentrated IoT (2021) (36)
- Based on T-spherical fuzzy environment: A combination of FWZIC and FDOSM for prioritising COVID-19 vaccine dose recipients (2021) (36)
- Blockchain Assisted Secure Data Sharing Model for Internet of Things Based Smart Industries (2022) (35)
- An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles (2021) (35)
- Novel dynamic fuzzy Decision-Making framework for COVID-19 vaccine dose recipients (2021) (34)
- DBD: Deep Learning DGA-Based Botnet Detection (2019) (34)
- FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems (2022) (34)
- A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT (2018) (33)
- An Optimal transportation routing approach using GIS-based dynamic traffic flows (2010) (33)
- Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities (2020) (32)
- An oppositional-Cauchy based GSK evolutionary algorithm with a novel deep ensemble reinforcement learning strategy for COVID-19 diagnosis (2021) (32)
- Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions (2021) (32)
- Ransomware Triage Using Deep Learning: Twitter as a Case Study (2019) (32)
- Information Security Governance: The Art of Detecting Hidden Malware (2013) (31)
- Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomy (2022) (31)
- Next-Generation Big Data Federation Access Control: A Reference Model (2019) (31)
- Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control (2020) (30)
- Multiagent Actor-Critic Network-Based Incentive Mechanism for Mobile Crowdsensing in Industrial Systems (2021) (30)
- Rise of multiattribute decision‐making in combating COVID‐19: A systematic review of the state‐of‐the‐art literature (2021) (27)
- A Review of Automatic Phenotyping Approaches using Electronic Health Records (2019) (27)
- Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things (2021) (27)
- Delegated content erasure in IPFS (2020) (27)
- Novel Triplex Procedure for Ranking the Ability of Software Engineering Students Based on Two levels of AHP and Group TOPSIS Techniques (2020) (26)
- AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center (2021) (26)
- TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud (2020) (26)
- Securing smart vehicles from relay attacks using machine learning (2019) (26)
- Security by Design for Big Data Frameworks Over Cloud Computing (2021) (26)
- Comparative Study of Indoor Propagation Model Below and Above 6 GHz for 5G Wireless Networks (2019) (26)
- Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems (2021) (26)
- A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing (2021) (25)
- Spam Emails Detection Based on Distributed Word Embedding with Deep Learning (2020) (25)
- A Taxonomy of Blockchain Threats and Vulnerabilities (2019) (24)
- mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects (2020) (24)
- Blockchain for Cybersecurity and Privacy (2020) (24)
- Using response action with intelligent intrusion detection and prevention system against web application malware (2014) (23)
- Situation-Aware BDI Reasoning to Detect Early Symptoms of Covid 19 Using Smartwatch (2023) (23)
- Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment (2021) (23)
- Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model (2019) (23)
- MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning (2020) (22)
- ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media (2020) (22)
- CDP-UA: Cognitive Data Processing Method Wearable Sensor Data Uncertainty Analysis in the Internet of Things Assisted Smart Medical Healthcare Systems (2021) (22)
- A secure and lightweight authentication scheme for next generation IoT infrastructure (2021) (22)
- Detecting malicious behaviour using supervised learning algorithms of the function calls (2013) (21)
- A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City (2020) (21)
- Smart Sensing Based Functional Control for Reducing Uncertainties in Agricultural Farm Data Analysis (2021) (20)
- A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect (2020) (20)
- Enabling the content dissemination through caching in the state-of-the-art sustainable information and communication technologies (2020) (20)
- Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things (2022) (20)
- Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions (2022) (19)
- A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques (2021) (18)
- A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction (2020) (18)
- Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system (2022) (18)
- Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications (2021) (18)
- Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network (2020) (18)
- Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0 (2022) (18)
- Prediction of Landsliding using Univariate Forecasting Models (2020) (17)
- Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs (2012) (17)
- Six Sigma Approach to Improve Quality in E-Services: An Empirical Study in Jordan (2012) (17)
- A Comprehensive Survey on Computer Forensics: State-of-the-art, Tools, Techniques, Challenges, and Future Directions (2022) (17)
- Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions (2021) (17)
- Deep Learning Techniques for Behavioral Malware Analysis in Cloud IaaS (2020) (17)
- A Smart Cloud Service Management Algorithm for Vehicular Clouds (2020) (17)
- 3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks (2021) (16)
- RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack (2020) (16)
- BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem (2021) (16)
- PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET (2022) (16)
- A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity (2019) (16)
- Genetic CFL: Optimization of Hyper-Parameters in Clustered Federated Learning (2021) (15)
- XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions (2022) (15)
- Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain (2021) (15)
- Crime in Cyberspace: Offenders and the Role of Organized Crime Groups (2013) (15)
- Secure Passive Keyless Entry and Start System Using Machine Learning (2018) (14)
- A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security (2020) (14)
- Driver Identification Using Optimized Deep Learning Model in Smart Transportation (2022) (14)
- Recent advances in Blockchain Technology: A survey on Applications and Challenges (2020) (14)
- InfusedHeart: A Novel Knowledge-Infused Learning Framework for Diagnosis of Cardiovascular Events (2022) (14)
- Slight: A lightweight authentication scheme for smart healthcare services (2022) (14)
- AmritaDGA: a comprehensive data set for domain generation algorithms (DGAs) based domain name detection systems and application of deep learning (2019) (14)
- Organizations and Cybercrime (2013) (13)
- Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning (2021) (13)
- A Survey on Energy Trading in the Smart Grid: Taxonomy, Research Challenges and Solutions (2021) (13)
- MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices (2019) (13)
- Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges (2022) (13)
- Machine Intelligence and Big Data Analytics for Cybersecurity Applications (2021) (13)
- BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment (2021) (13)
- Towards Automatic Image Segmentation Using Optimised Region Growing Technique (2009) (13)
- Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives (2022) (13)
- Malware Analysis Using Artificial Intelligence and Deep Learning (2021) (12)
- Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain (2023) (12)
- The malware detection challenge of accuracy (2016) (12)
- Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain (2020) (12)
- A Framework for Prediction and Storage of Battery Life in IoT Devices using DNN and Blockchain (2020) (12)
- Disclosure of cyber security vulnerabilities: time series modelling (2018) (12)
- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks (2019) (12)
- Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique (2021) (12)
- Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps (2022) (11)
- A secure localization scheme based on trust assessment for WSNs using blockchain technology (2021) (11)
- Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network (2021) (11)
- Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare (2022) (11)
- A secure demand response management authentication scheme for smart grid (2021) (11)
- A Lightweight Signcryption Method for Perception Layer in Internet-of-Things (2020) (11)
- An Analysis of the Nature of Spam as Cybercrime (2017) (10)
- Malicious Code Detection Using Penalized Splines on OPcode Frequency (2012) (10)
- PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service (2021) (10)
- DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems (2022) (10)
- Adaptive and Priority-Based Resource Allocation for Efficient Resources Utilization in Mobile-Edge Computing (2023) (10)
- AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks (2022) (10)
- Predicting likelihood of legitimate data loss in email DLP (2020) (10)
- Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia (2021) (9)
- Socioscope: I know who you are, a robo, human caller or service number (2020) (9)
- The Role of Spam in Cybercrime: Data from the Australian Cybercrime Pilot Observatory (2015) (9)
- Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things (2023) (9)
- Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems (2023) (9)
- Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata (2020) (9)
- IoT-assisted physical education training network virtualization and resource management using a deep reinforcement learning system (2021) (9)
- Classification of Malware Using Visualisation of Similarity Matrices (2017) (9)
- Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT (2020) (8)
- Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions (2022) (8)
- PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle (2022) (8)
- A survey and taxonomy of consensus protocols for blockchains (2022) (8)
- DURLD: Malicious URL Detection Using Deep Learning-Based Character Level Representations (2020) (8)
- Attention-Based Multidimensional Deep Learning Approach for Cross-Architecture IoMT Malware Detection and Classification in Healthcare Cyber-Physical Systems (2022) (8)
- Exploiting Vulnerability Disclosures: Statistical Framework and Case Study (2016) (8)
- Malicious URL Detection using Deep Learning (2020) (8)
- Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges (2020) (8)
- Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots (2022) (8)
- A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems (2022) (8)
- Differentially Private Tensor Train Deep Computation for Internet of Multimedia Things (2020) (8)
- Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges (2019) (8)
- Poster: A Pluggable Authentication Module for Big Data Federation Architecture (2019) (7)
- A Survey on LTE/LTE-A Radio Resource Allocation Techniques for Machine-to-Machine Communication for B5G Networks (2021) (7)
- A Novel Deep Learning Model to Secure Internet of Things in Healthcare (2020) (7)
- CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (2020) (7)
- A deep learning architecture for power management in smart cities (2022) (7)
- Quality Approaches for Performance Measurement in Jordanian E-Government Services (2014) (7)
- Forensic Detection of Child Exploitation Material Using Deep Learning (2019) (7)
- Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV (2020) (7)
- BioUAV: blockchain-envisioned framework for digital identification to secure access in next-generation UAVs (2020) (7)
- Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection (2019) (7)
- DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things (2021) (7)
- A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network (2019) (6)
- IECL: An Intelligent Energy Consumption Model for Cloud Manufacturing (2022) (6)
- User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack (2022) (6)
- Hyperspectral Image Classification Based on Multibranch Attention Transformer Networks (2022) (6)
- Cyber Terrorism: Research Review: Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology (2017) (6)
- On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things (2021) (6)
- Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments (2021) (6)
- Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications (2021) (6)
- Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing (2019) (5)
- Federated Learning for IoUT: Concepts, Applications, Challenges and Opportunities (2022) (5)
- The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface (2021) (5)
- Cyber Security Researcher and Practitioner with Industry and Academic Experience (2020) (5)
- AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint (2022) (5)
- Toward Detection of Child Exploitation Material: A Forensic Approach (2019) (5)
- Smart contract token-based privacy-preserving access control system for industrial Internet of Things (2022) (5)
- Trust, Security and Privacy for Big Data (2022) (5)
- Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks (2020) (5)
- Skype Traffic Classification Using Cost Sensitive Algorithms (2013) (5)
- Tear film breakup time-based dry eye disease detection using convolutional neural network (2022) (5)
- Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing (2021) (5)
- Ant-Inspired Recurrent Deep Learning Model for Improving the Service Flow of Intelligent Transportation Systems (2020) (5)
- AI-based quality of service optimization for multimedia transmission on Internet of Vehicles (IoV) systems (2022) (5)
- Adversarial malware sample generation method based on the prototype of deep learning detector (2022) (4)
- Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery (2023) (4)
- Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things (2019) (4)
- A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images (2022) (4)
- Question-aware memory network for multi-hop question answering in human–robot interaction (2021) (4)
- A Survey of Intelligent Techniques for Android Malware Detection (2020) (4)
- Boosted Tree Classifier Algorithm Based Collaborative Computing Framework for Smart System (2020) (4)
- Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks (2022) (4)
- RETRACTED ARTICLE: Machine Learning-Based Holistic Privacy Decentralized Framework for Big Data Security and Privacy in Smart City (2021) (4)
- Quality-aware trajectory planning of cellular connected UAVs (2020) (4)
- Cyber Security in the Gulf Cooperation Council (2015) (3)
- Towards Energy Efficient Approx Cache-coherence Protocol Verified using Model Checker (2021) (3)
- DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS (2023) (3)
- Integrating Multihub Driven Attention Mechanism and Big Data Analytics for Virtual Representation of Visual Scenes (2021) (3)
- A Survey of Explainable Artificial Intelligence for Smart Cities (2023) (3)
- Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks (2021) (3)
- Computer Application in Game Map Path-Finding Based on Fuzzy Logic Dynamic Hierarchical Ant Colony Algorithm (2021) (3)
- CroLSSim: Cross‐language software similarity detector using hybrid approach of LSA‐based AST‐MDrep features and CNN‐LSTM model (2022) (3)
- Implementing Data Analytics and Architectures for Next Generation Wireless Communications (2021) (3)
- A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid (2022) (3)
- A Blockchain Framework in Post-Quantum Decentralization (2021) (3)
- Detecting and preventing criminal activities in shopping malls using massive video surveillance based on deep learning models (2021) (3)
- Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin (2022) (3)
- Analysis of firewall log-based detection scenarios for evidence in digital forensics (2012) (3)
- A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System (2022) (3)
- Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks (2022) (3)
- Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts (2022) (2)
- Deep learning architecture for big data analytics in detecting intrusions and malicious URL (2019) (2)
- Anomaly-based intrusion detection system in IoT using kernel extreme learning machine (2022) (2)
- Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities (2021) (2)
- Real-time Fraud Detection in e-Market Using Machine Learning Algorithms (2021) (2)
- Joint Optimal Quantization and Aggregation of Federated Learning Scheme in VANETs (2022) (2)
- IT Governance and Information Security (2021) (2)
- BC-IoDT: blockchain-based framework for authentication in internet of drone things (2022) (2)
- Stochastic Model Based Approach for Biometric Identification (2010) (2)
- On preserving privacy in cloud computing using ToR (2016) (2)
- Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications (2022) (2)
- Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network using Hybrid Approach (2021) (2)
- Deep Learning for Internet of Things Infrastructure (2021) (2)
- Adversarial ELF Malware Detection Method Using Model Interpretation (2023) (2)
- GOM: New genetic optimizing model for broadcasting tree in MANET (2010) (2)
- Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs (2020) (2)
- A Blockchain-Based Secure Data Sharing Framework for Healthcare (2020) (2)
- Revisiting the Approaches, Datasets and Evaluation Parameters to Detect Android Malware: A Comparative Study from State-of-Art (2021) (1)
- Applying Genetic Algorithm for Optimizing Broadcasting Process in Ad-hoc Network (2010) (1)
- A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas (2023) (1)
- Prediction of athlete movements using wearable sensors for sports person health monitoring application (2021) (1)
- AndroShow: A Large Scale Investigation to Identify the Pattern of Obfuscated Android Malware (2020) (1)
- Secrecy Performance for RIS-Based Integrated Satellite Vehicle Networks With a UAV Relay and MRC Eavesdropping (2023) (1)
- OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems (2023) (1)
- Cybercrime and Data Breach: Privacy Protection through the Regulation of Voluntary Notification (2017) (1)
- Ensuring Data Integrity (2020) (1)
- RffAe-S: Autoencoder Based on Random Fourier Feature With Separable Loss for Unsupervised Signal Modulation Clustering (2022) (1)
- Smart and Secure Internet of Healthcare Things (2022) (1)
- BioUAV (2020) (1)
- A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus (2022) (1)
- Integrated Satellite Multiple Two-Way Relay Networks: Secrecy Performance Under Multiple Eves and Vehicles With Non-Ideal Hardware (2023) (1)
- Spam and crime (2017) (1)
- IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network (2020) (1)
- AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System (2022) (1)
- AI and machine learning for the analysis of data flow characteristics in industrial network communication security (2021) (1)
- The Role of Spam in Cybercrime (2015) (1)
- Introduction to Special Issue on Future of Wireless Communication and 6G Networks (2021) (1)
- RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach (2023) (1)
- Message from the conference general chairs (2016) (1)
- Trajectory Data Acquisition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments (2022) (1)
- RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment (2020) (1)
- Unified Spatial-Temporal Neighbor Attention Network for Dynamic Traffic Prediction (2023) (1)
- Guest Editorial Federated Learning for Privacy Preservation of Healthcare Data in Internet of Medical Things and Patient Monitoring (2023) (1)
- Trust management for internet of things using cloud computing and security in smart cities (2021) (1)
- Information Security Policy (2021) (0)
- A Comparative Analysis of Machine and Deep Learning Classifiers for Intrusion Detection (2023) (0)
- Immune Evolutionary Generative Adversarial Networks for Hyperspectral Image Classification (2022) (0)
- Cloud Computing as a Key Pillar for Agile IT Governance (2021) (0)
- A novel malware detection using hybrid wrapper-filter approach and op-code frequency statistics based on extended x86 IA-32 binary assembly instructions (2012) (0)
- Federated Learning for IoUT: Concepts, Applications, Challenges and Future Directions (2022) (0)
- Blockchain Assisted Disease Identification of COVID-19 Patients with the Help of IDA-DNN Classifier (2022) (0)
- Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges (2021) (0)
- PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption (2022) (0)
- Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and Classification. (2023) (0)
- Information System and IT Governance Evolution (2021) (0)
- Android Malware Detection Techniques (2020) (0)
- Computational Intelligence for Cybersecurity Management and Applications (2023) (0)
- A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function (2023) (0)
- Decentralized security framework for future IoT end-to-end connectivity (2022) (0)
- Transfer Learning-Aided Collaborative Computational Method for Intelligent Transportation System Applications (2022) (0)
- Corrigendum to “Novel dynamic fuzzy Decision-Making framework for COVID-19 vaccine dose recipients” [J. Adv. Res. 37 (2022) 147–168] (2023) (0)
- A Model Based Approach for the Extraction of Network Forensic Artifacts (2017) (0)
- Information Security Governance (2021) (0)
- IT Governance in Organizations (2021) (0)
- IEEE SmartData 2020 Program Committees (2020) (0)
- Multiagent Reinforcement Learning-Based Semi-Persistent Scheduling Scheme in C-V2X Mode 4 (2022) (0)
- A Review of Security and Privacy within Smart Cities - An Intrusion Detection Perspective (2020) (0)
- Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2023) (0)
- A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU (2020) (0)
- Welcome Message from the CCC 2017 General Chairs (2018) (0)
- Attention‐based convolutional neural network deep learning approach for robust malware classification (2022) (0)
- Etaher, Najla and Weir, George R. S. and Alazab, Mamoun (2015) From ZeuS to Zitmo : trends in banking malware. In: Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing (2018) (0)
- Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society (2021) (0)
- Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion (2023) (0)
- EasyChair Preprint No 634 A Hybrid Technique To Detect Botnets , Based on P 2 P Trac Similarity (0)
- Cybercrime in Australian Cyberspace: Evidence Based Results from Known Victims (2012) (0)
- Special Issue on: Cybersecurity in the Connected World (2018) (0)
- Message from the DependSys 2021 Program Chairs (2021) (0)
- IT Service Management as a Key Pillar for IT Governance (2021) (0)
- Responses to heat waves: what can Twitter data tell us? (2023) (0)
- A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes (2023) (0)
- A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection (2022) (0)
- Intelligent Mobile Malware Detection (2022) (0)
- Securing smart vehicles from relay attacks using machine learning (2019) (0)
- STAR-RIS-Empowered Cognitive Non-Terrestrial Vehicle Network with NOMA (2023) (0)
- Cloud Computing based E-commerce Management Ontransaction Security Concepts (2021) (0)
- Introduction to the special section on recent advances on blockchain infrastructures and applications (2020) (0)
- Deep Learning for Cyber Security Applications: A Comprehensive Survey (2021) (0)
- Digging the Underlying Layers of Intelligent Transportation System Networks by Mobile Crowdsourcing (2022) (0)
- A Multi-Node Collaborative Decision-Making Scheme for Privacy Protection in IIoT (2023) (0)
- Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud (2022) (0)
- An SDN perspective IoT-Fog security: A survey (2023) (0)
- Reschain (2020) (0)
- Poster (2019) (0)
- Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds (2023) (0)
- Secure Task Distribution with Verifiable Re-encryption in Mobile Crowdsensing Assisted Emergency IoT System (2023) (0)
- IoT-assisted physical education training network virtualization and resource management using a deep reinforcement learning system (2021) (0)
This paper list is powered by the following services:
Other Resources About Mamoun Alazab
What Schools Are Affiliated With Mamoun Alazab?
Mamoun Alazab is affiliated with the following schools: