팔로우
Ammar Alazab
Ammar Alazab
Torrens university
확인된 이메일 없음 - 홈페이지
제목
인용
인용
연도
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab
Cybersecurity 4, 1-27, 2021
2942021
A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks
A Khraisat, Gondal, Vamplew, Kamruzzaman
Electronics 8 (11), 1210, 2019
2082019
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab
Electronics 9 (1), 173, 2020
1672020
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1672012
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012
1122012
Artificial intelligence for securing industrial-based cyber–physical systems
Z Lv, D Chen, R Lou, A Alazab
Future generation computer systems 117, 291-298, 2021
1102021
Machine learning based botnet identification traffic
A Azab, M Alazab, M Aiash
2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016
1072016
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
Benchmarking: an international journal 20 (4), 512-536, 2013
902013
Mining malware to detect variants
A Azab, R Layton, M Alazab, J Oliver
2014 fifth cybercrime and trustworthy computing conference, 44-53, 2014
732014
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0
MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ...
IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022
592022
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
3rd International conference on information and financial engineering IPEDR …, 2011
542011
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks, 2022
442022
Using response action with intelligent intrusion detection and prevention system against web application malware
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab
Information Management & Computer Security 22 (5), 431-449, 2014
442014
Information security governance: the art of detecting hidden malware
M Alazab, S Venkatraman, P Watters, M Alazab
IT security governance innovations: theory and research, 293-315, 2013
382013
Msic: malware spectrogram image classification
A Azab, M Khasawneh
IEEE Access 8, 102007-102021, 2020
322020
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
Proceedings of the 7th international conference on information technology …, 2011
292011
Characterising network traffic for skype forensics
A Azab, P Watters, R Layton
2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012
272012
Six Sigma approach to improve quality in e-services: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012
272012
Detection of obfuscated malicious JavaScript code
A Alazab, A Khraisat, M Alazab, S Singh
Future Internet 14 (8), 217, 2022
242022
Maximising competitive advantage on E-business websites: A data mining approach
A Alazab, S Bevinakoppa, A Khraisat
2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018
242018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20