Mamoun Alazab
Orcid: 0000-0002-1928-3704Affiliations:
- Charles Darwin University, Casuarina, NT, Australia
According to our database1,
Mamoun Alazab
authored at least 262 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability.
IEEE Trans. Mob. Comput., December, 2024
Leveraging Drone-Assisted Surveillance for Effective Forest Conservation: A Case Study in Australia's Daintree Rainforest.
IEEE Internet Things J., October, 2024
InfusedHeart: A Novel Knowledge-Infused Learning Framework for Diagnosis of Cardiovascular Events.
IEEE Trans. Comput. Soc. Syst., June, 2024
Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and Classification.
IEEE J. Biomed. Health Informatics, March, 2024
Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms.
J. Netw. Comput. Appl., March, 2024
Wirel. Pers. Commun., February, 2024
Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System.
IEEE Internet Things J., February, 2024
Tear film breakup time-based dry eye disease detection using convolutional neural network.
Neural Comput. Appl., January, 2024
Anomaly-based intrusion detection system in IoT using kernel extreme learning machine.
J. Ambient Intell. Humaniz. Comput., January, 2024
IEEE Internet Things J., 2024
M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks.
Comput. Secur., 2024
Appl. Soft Comput., 2024
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024
2023
IEEE Trans. Ind. Informatics, December, 2023
Joint Resources Allocation and 3D Trajectory Optimization for UAV-Enabled Space-Air-Ground Integrated Networks.
IEEE Trans. Veh. Technol., November, 2023
A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus.
IEEE Trans. Intell. Transp. Syst., November, 2023
Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective.
IEEE Trans. Intell. Transp. Syst., November, 2023
Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges.
IEEE Consumer Electron. Mag., November, 2023
Predicting Urban Region Heat via Learning Arrive-Stay-Leave Behaviors of Private Cars.
IEEE Trans. Intell. Transp. Syst., October, 2023
Comput. Secur., September, 2023
Attention-Based Multidimensional Deep Learning Approach for Cross-Architecture IoMT Malware Detection and Classification in Healthcare Cyber-Physical Systems.
IEEE Trans. Comput. Soc. Syst., August, 2023
IEEE Trans. Intell. Veh., June, 2023
Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things.
IEEE Internet Things Mag., June, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
IEEE Trans. Intell. Transp. Syst., April, 2023
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery.
IEEE Trans. Ind. Informatics, April, 2023
Smart contract token-based privacy-preserving access control system for industrial Internet of Things.
Digit. Commun. Networks, April, 2023
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images.
Clust. Comput., April, 2023
IEEE Trans. Veh. Technol., February, 2023
Secrecy Performance for RIS-Based Integrated Satellite Vehicle Networks With a UAV Relay and MRC Eavesdropping.
IEEE Trans. Intell. Veh., February, 2023
Integrated Satellite Multiple Two-Way Relay Networks: Secrecy Performance Under Multiple Eves and Vehicles With Non-Ideal Hardware.
IEEE Trans. Intell. Veh., February, 2023
DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023
Guest Editorial Federated Learning for Privacy Preservation of Healthcare Data in Internet of Medical Things and Patient Monitoring.
IEEE J. Biomed. Health Informatics, February, 2023
Toward a Sustainable Transportation Industry: Oil Company Benchmarking Based on the Extension of Linear Diophantine Fuzzy Rough Sets and Multicriteria Decision-Making Methods.
IEEE Trans. Fuzzy Syst., February, 2023
Adaptive and Priority-Based Resource Allocation for Efficient Resources Utilization in Mobile-Edge Computing.
IEEE Internet Things J., February, 2023
Attention-based convolutional neural network deep learning approach for robust malware classification.
Comput. Intell., February, 2023
Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach.
Wirel. Pers. Commun., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Ind. Informatics, 2023
OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems.
IEEE Trans. Ind. Informatics, 2023
Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems.
IEEE Trans. Ind. Informatics, 2023
Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023
Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning.
IEEE Trans. Engineering Management, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023
Comput. Secur., 2023
Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions.
IEEE Access, 2023
2022
ACM Trans. Internet Techn., November, 2022
Blockchain Assisted Disease Identification of COVID-19 Patients with the Help of IDA-DNN Classifier.
Wirel. Pers. Commun., 2022
Multiagent Reinforcement Learning-Based Semi-Persistent Scheduling Scheme in C-V2X Mode 4.
IEEE Trans. Veh. Technol., 2022
Blockchain Assisted Secure Data Sharing Model for Internet of Things Based Smart Industries.
IEEE Trans. Reliab., 2022
IEEE/ACM Trans. Netw., 2022
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks.
ACM Trans. Internet Techn., 2022
Boosted Tree Classifier Algorithm Based Collaborative Computing Framework for Smart System.
IEEE Trans. Netw. Sci. Eng., 2022
DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2022
Trajectory Data Acquisition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments.
IEEE Trans. Intell. Transp. Syst., 2022
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment.
IEEE Trans. Ind. Informatics, 2022
Integrating Multihub Driven Attention Mechanism and Big Data Analytics for Virtual Representation of Visual Scenes.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022
Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0.
IEEE Trans. Ind. Informatics, 2022
Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin.
IEEE Trans. Ind. Informatics, 2022
RffAe-S: Autoencoder Based on Random Fourier Feature With Separable Loss for Unsupervised Signal Modulation Clustering.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Immune Evolutionary Generative Adversarial Networks for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2022
Hyperspectral Image Classification Based on Multibranch Attention Transformer Networks.
IEEE Trans. Geosci. Remote. Sens., 2022
Transfer Learning-Aided Collaborative Computational Method for Intelligent Transportation System Applications.
IEEE Trans. Green Commun. Netw., 2022
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Engineering Management, 2022
A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid.
IEEE Trans. Computers, 2022
FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems.
Sensors, 2022
IEEE J. Sel. Areas Commun., 2022
Internet Technol. Lett., 2022
Federated Learning for IoUT: Concepts, Applications, Challenges and Future Directions.
IEEE Internet Things Mag., 2022
Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks.
IEEE Internet Things Mag., 2022
IEEE Internet Things J., 2022
CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model.
Int. J. Intell. Syst., 2022
Rise of multiattribute decision-making in combating COVID-19: A systematic review of the state-of-the-art literature.
Int. J. Intell. Syst., 2022
Computer Application in Game Map Path-Finding Based on Fuzzy Logic Dynamic Hierarchical Ant Colony Algorithm.
Int. J. Fuzzy Syst., 2022
Int. J. Comput. Appl. Technol., 2022
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses.
Comput. Stand. Interfaces, 2022
CoRR, 2022
XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions.
CoRR, 2022
Adversarial malware sample generation method based on the prototype of deep learning detector.
Comput. Secur., 2022
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives.
Comput. Secur., 2022
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems.
Comput. Commun., 2022
Federated Learning for intrusion detection system: Concepts, challenges and future directions.
Comput. Commun., 2022
Trust management for internet of things using cloud computing and security in smart cities.
Clust. Comput., 2022
Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets.
IEEE Consumer Electron. Mag., 2022
Towards Energy Efficient Approx Cache-coherence Protocol Verified using Model Checker.
Comput. Electr. Eng., 2022
Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system.
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions.
Big Data Cogn. Comput., 2022
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions.
IEEE Access, 2022
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint.
Proceedings of the IEEE International Conference on Communications, 2022
2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment.
ACM Trans. Internet Techn., 2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities.
IEEE Trans. Netw. Sci. Eng., 2021
CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU.
IEEE Trans. Netw. Sci. Eng., 2021
Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2021
Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Ant-Inspired Recurrent Deep Learning Model for Improving the Service Flow of Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications.
IEEE Trans. Intell. Transp. Syst., 2021
A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021
CDP-UA: Cognitive Data Processing Method Wearable Sensor Data Uncertainty Analysis in the Internet of Things Assisted Smart Medical Healthcare Systems.
IEEE J. Biomed. Health Informatics, 2021
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.
IEEE Trans. Ind. Informatics, 2021
Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
Multiagent Actor-Critic Network-Based Incentive Mechanism for Mobile Crowdsensing in Industrial Systems.
IEEE Trans. Ind. Informatics, 2021
Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks.
IEEE Trans. Ind. Informatics, 2021
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center.
IEEE Trans. Green Commun. Netw., 2021
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021
Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction.
Softw. Pract. Exp., 2021
Peer-to-Peer Netw. Appl., 2021
J. Multiple Valued Log. Soft Comput., 2021
Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities.
Microprocess. Microsystems, 2021
A novel PCA-whale optimization-based deep neural network model for classification of tomato plant diseases using GPU.
J. Real Time Image Process., 2021
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions.
J. Netw. Comput. Appl., 2021
IEEE Internet Things J., 2021
Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things.
IEEE Internet Things J., 2021
RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack.
IEEE Internet Things J., 2021
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021
Int. J. Wirel. Inf. Networks, 2021
Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
Novel Triplex Procedure for Ranking the Ability of Software Engineering Students Based on Two levels of AHP and Group TOPSIS Techniques.
Int. J. Inf. Technol. Decis. Mak., 2021
Interval type 2 trapezoidal-fuzzy weighted with zero inconsistency combined with VIKOR for evaluating smart e-tourism applications.
Int. J. Intell. Syst., 2021
Multidimensional benchmarking of the active queue management methods of network congestion control based on extension of fuzzy decision by opinion score method.
Int. J. Intell. Syst., 2021
AI and machine learning for the analysis of data flow characteristics in industrial network communication security.
Int. J. Ad Hoc Ubiquitous Comput., 2021
Int. J. Ad Hoc Ubiquitous Comput., 2021
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics.
Future Gener. Comput. Syst., 2021
An ensemble machine learning approach through effective feature extraction to classify fake news.
Future Gener. Comput. Syst., 2021
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace.
Future Gener. Comput. Syst., 2021
A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem.
Future Gener. Comput. Syst., 2021
Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia.
Future Gener. Comput. Syst., 2021
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection.
Future Gener. Comput. Syst., 2021
Comput. Stand. Interfaces, 2021
Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges.
CoRR, 2021
CoRR, 2021
Question-Aware Memory Network for Multi-hop Question Answering in Human-Robot Interaction.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
A secure and lightweight authentication scheme for next generation IoT infrastructure.
Comput. Commun., 2021
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks.
Comput. Commun., 2021
Comput. Intell. Neurosci., 2021
A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques.
Comput. Electr. Eng., 2021
An oppositional-Cauchy based GSK evolutionary algorithm with a novel deep ensemble reinforcement learning strategy for COVID-19 diagnosis.
Appl. Soft Comput., 2021
A Survey on LTE/LTE-A Radio Resource Allocation Techniques for Machine-to-Machine Communication for B5G Networks.
IEEE Access, 2021
A Survey on Energy Trading in the Smart Grid: Taxonomy, Research Challenges and Solutions.
IEEE Access, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
2020
Whale Optimization Algorithm With Applications to Resource Allocation in Wireless Networks.
IEEE Trans. Veh. Technol., 2020
Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV.
IEEE Trans. Veh. Technol., 2020
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2020
Differentially Private Tensor Train Deep Computation for Internet of Multimedia Things.
ACM Trans. Multim. Comput. Commun. Appl., 2020
J. Supercomput., 2020
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020
TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud.
IEEE Trans. Ind. Informatics, 2020
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning.
IEEE Trans. Computers, 2020
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.
Sensors, 2020
J. Inf. Secur. Appl., 2020
Sum-Rate Maximization for UAV-Assisted Visible Light Communications Using NOMA: Swarm Intelligence Meets Machine Learning.
IEEE Internet Things J., 2020
Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT.
IEEE Internet Things J., 2020
A lightweight IoT-based security framework for inventory automation using wireless sensor network.
Int. J. Commun. Syst., 2020
Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects.
Comput. Sci. Rev., 2020
Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements and Challenges.
CoRR, 2020
CoRR, 2020
Comput. Secur., 2020
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture.
Comput. Commun., 2020
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture.
Comput. Networks, 2020
Introduction to the special section on recent advances on blockchain infrastructures and applications.
Comput. Electr. Eng., 2020
IEEE Access, 2020
Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges.
IEEE Access, 2020
IEEE Access, 2020
A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City.
IEEE Access, 2020
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges.
IEEE Access, 2020
IEEE Access, 2020
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
BioUAV: blockchain-envisioned framework for digital identification to secure access in next-generation UAVs.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
A Framework for Prediction and Storage of Battery Life in IoT Devices using DNN and Blockchain.
Proceedings of the IEEE Globecom Workshops, 2020
2019
IEEE Trans. Big Data, 2019
J. Inf. Secur. Appl., 2019
A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing.
IEEE Access, 2019
Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model.
IEEE Access, 2019
IEEE Access, 2019
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data.
IEEE Access, 2019
MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
2018
Secur. Commun. Networks, 2018
Int. J. Electron. Secur. Digit. Forensics, 2018
CoRR, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
2016
Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Gener. Comput. Syst., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Using response action with intelligent intrusion detection and prevention system against web application malware.
Inf. Manag. Comput. Secur., 2014
2013
Detecting malicious behaviour using supervised learning algorithms of the function calls.
Int. J. Electron. Secur. Digit. Forensics, 2013
2012
Analysis of firewall log-based detection scenarios for evidence in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2012
Int. J. Electron. Gov. Res., 2012
2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011
2009
Proceedings of the AI 2009: Advances in Artificial Intelligence, 2009