Mamoun Alazab

Orcid: 0000-0002-1928-3704

Affiliations:
  • Charles Darwin University, Casuarina, NT, Australia


According to our database1, Mamoun Alazab authored at least 262 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability.
IEEE Trans. Mob. Comput., December, 2024

Leveraging Drone-Assisted Surveillance for Effective Forest Conservation: A Case Study in Australia's Daintree Rainforest.
IEEE Internet Things J., October, 2024

InfusedHeart: A Novel Knowledge-Infused Learning Framework for Diagnosis of Cardiovascular Events.
IEEE Trans. Comput. Soc. Syst., June, 2024

Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and Classification.
IEEE J. Biomed. Health Informatics, March, 2024

Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024

Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms.
J. Netw. Comput. Appl., March, 2024

Adaptive asynchronous federated learning.
Future Gener. Comput. Syst., March, 2024

A Lightweight Cooperative Intrusion Detection System for RPL-based IoT.
Wirel. Pers. Commun., February, 2024

Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System.
IEEE Internet Things J., February, 2024

Tear film breakup time-based dry eye disease detection using convolutional neural network.
Neural Comput. Appl., January, 2024

Anomaly-based intrusion detection system in IoT using kernel extreme learning machine.
J. Ambient Intell. Humaniz. Comput., January, 2024

A Deep-Learning-Integrated Blockchain Framework for Securing Industrial IoT.
IEEE Internet Things J., 2024

M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks.
Comput. Secur., 2024

Broad learning: A GPU-free image-based malware classification.
Appl. Soft Comput., 2024

Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024

2023
A Multinode Collaborative Decision-Making Scheme for Privacy Protection in IIoT.
IEEE Trans. Ind. Informatics, December, 2023

Joint Resources Allocation and 3D Trajectory Optimization for UAV-Enabled Space-Air-Ground Integrated Networks.
IEEE Trans. Veh. Technol., November, 2023

A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus.
IEEE Trans. Intell. Transp. Syst., November, 2023

Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective.
IEEE Trans. Intell. Transp. Syst., November, 2023

Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges.
IEEE Consumer Electron. Mag., November, 2023

Predicting Urban Region Heat via Learning Arrive-Stay-Leave Behaviors of Private Cars.
IEEE Trans. Intell. Transp. Syst., October, 2023

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
Comput. Secur., September, 2023

Attention-Based Multidimensional Deep Learning Approach for Cross-Architecture IoMT Malware Detection and Classification in Healthcare Cyber-Physical Systems.
IEEE Trans. Comput. Soc. Syst., August, 2023

STAR-RIS-Empowered Cognitive Non-Terrestrial Vehicle Network With NOMA.
IEEE Trans. Intell. Veh., June, 2023

Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things.
IEEE Internet Things Mag., June, 2023

An SDN perspective IoT-Fog security: A survey.
Comput. Networks, June, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas.
IEEE Trans. Intell. Transp. Syst., April, 2023

RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery.
IEEE Trans. Ind. Informatics, April, 2023

Smart contract token-based privacy-preserving access control system for industrial Internet of Things.
Digit. Commun. Networks, April, 2023

A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images.
Clust. Comput., April, 2023

Unified Spatial-Temporal Neighbor Attention Network for Dynamic Traffic Prediction.
IEEE Trans. Veh. Technol., February, 2023

Secrecy Performance for RIS-Based Integrated Satellite Vehicle Networks With a UAV Relay and MRC Eavesdropping.
IEEE Trans. Intell. Veh., February, 2023

Integrated Satellite Multiple Two-Way Relay Networks: Secrecy Performance Under Multiple Eves and Vehicles With Non-Ideal Hardware.
IEEE Trans. Intell. Veh., February, 2023

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023

Guest Editorial Federated Learning for Privacy Preservation of Healthcare Data in Internet of Medical Things and Patient Monitoring.
IEEE J. Biomed. Health Informatics, February, 2023

Toward a Sustainable Transportation Industry: Oil Company Benchmarking Based on the Extension of Linear Diophantine Fuzzy Rough Sets and Multicriteria Decision-Making Methods.
IEEE Trans. Fuzzy Syst., February, 2023

Adaptive and Priority-Based Resource Allocation for Efficient Resources Utilization in Mobile-Edge Computing.
IEEE Internet Things J., February, 2023

Attention-based convolutional neural network deep learning approach for robust malware classification.
Comput. Intell., February, 2023

Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach.
Wirel. Pers. Commun., 2023

A Blockchain Framework in Post-Quantum Decentralization.
IEEE Trans. Serv. Comput., 2023

Adversarial ELF Malware Detection Method Using Model Interpretation.
IEEE Trans. Ind. Informatics, 2023

OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems.
IEEE Trans. Ind. Informatics, 2023

Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems.
IEEE Trans. Ind. Informatics, 2023

Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023

Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning.
IEEE Trans. Engineering Management, 2023

Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection.
IEEE Trans. Dependable Secur. Comput., 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function.
Comput. Secur., 2023

Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions.
IEEE Access, 2023

2022
Driver Identification Using Optimized Deep Learning Model in Smart Transportation.
ACM Trans. Internet Techn., November, 2022

Blockchain Assisted Disease Identification of COVID-19 Patients with the Help of IDA-DNN Classifier.
Wirel. Pers. Commun., 2022

Multiagent Reinforcement Learning-Based Semi-Persistent Scheduling Scheme in C-V2X Mode 4.
IEEE Trans. Veh. Technol., 2022

Blockchain Assisted Secure Data Sharing Model for Internet of Things Based Smart Industries.
IEEE Trans. Reliab., 2022

User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022

AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks.
ACM Trans. Internet Techn., 2022

Boosted Tree Classifier Algorithm Based Collaborative Computing Framework for Smart System.
IEEE Trans. Netw. Sci. Eng., 2022

DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Trajectory Data Acquisition via Private Car Positioning Based on Tightly-coupled GPS/OBD Integration in Urban Environments.
IEEE Trans. Intell. Transp. Syst., 2022

AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Joint Optimal Quantization and Aggregation of Federated Learning Scheme in VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET.
IEEE Trans. Intell. Transp. Syst., 2022

On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022

IECL: An Intelligent Energy Consumption Model for Cloud Manufacturing.
IEEE Trans. Ind. Informatics, 2022

BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment.
IEEE Trans. Ind. Informatics, 2022

Integrating Multihub Driven Attention Mechanism and Big Data Analytics for Virtual Representation of Visual Scenes.
IEEE Trans. Ind. Informatics, 2022

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices.
IEEE Trans. Ind. Informatics, 2022

PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022

DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022

Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin.
IEEE Trans. Ind. Informatics, 2022

RffAe-S: Autoencoder Based on Random Fourier Feature With Separable Loss for Unsupervised Signal Modulation Clustering.
IEEE Trans. Ind. Informatics, 2022

Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications.
IEEE Trans. Ind. Informatics, 2022

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
IEEE Trans. Inf. Forensics Secur., 2022

Immune Evolutionary Generative Adversarial Networks for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2022

Hyperspectral Image Classification Based on Multibranch Attention Transformer Networks.
IEEE Trans. Geosci. Remote. Sens., 2022

Transfer Learning-Aided Collaborative Computational Method for Intelligent Transportation System Applications.
IEEE Trans. Green Commun. Netw., 2022

Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022

Security by Design for Big Data Frameworks Over Cloud Computing.
IEEE Trans. Engineering Management, 2022

A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid.
IEEE Trans. Computers, 2022

FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems.
Sensors, 2022

Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots.
IEEE J. Sel. Areas Commun., 2022

A survey and taxonomy of consensus protocols for blockchains.
J. Syst. Archit., 2022

A review on deep learning for future smart cities.
Internet Technol. Lett., 2022

Prediction of Landsliding using Univariate Forecasting Models.
Internet Technol. Lett., 2022

Federated Learning for IoUT: Concepts, Applications, Challenges and Future Directions.
IEEE Internet Things Mag., 2022

Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks.
IEEE Internet Things Mag., 2022

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things.
IEEE Internet Things J., 2022

CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model.
Int. J. Intell. Syst., 2022

Rise of multiattribute decision-making in combating COVID-19: A systematic review of the state-of-the-art literature.
Int. J. Intell. Syst., 2022

Computer Application in Game Map Path-Finding Based on Fuzzy Logic Dynamic Hierarchical Ant Colony Algorithm.
Int. J. Fuzzy Syst., 2022

A hybrid convolutional neural network model for detection of diabetic retinopathy.
Int. J. Comput. Appl. Technol., 2022

Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses.
Comput. Stand. Interfaces, 2022

Federated Learning for IoUT: Concepts, Applications, Challenges and Opportunities.
CoRR, 2022

XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions.
CoRR, 2022

Adversarial malware sample generation method based on the prototype of deep learning detector.
Comput. Secur., 2022

Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives.
Comput. Secur., 2022

A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems.
Comput. Commun., 2022

Federated Learning for intrusion detection system: Concepts, challenges and future directions.
Comput. Commun., 2022

Trust management for internet of things using cloud computing and security in smart cities.
Clust. Comput., 2022

Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets.
IEEE Consumer Electron. Mag., 2022

Towards Energy Efficient Approx Cache-coherence Protocol Verified using Model Checker.
Comput. Electr. Eng., 2022

Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system.
Comput. Electr. Eng., 2022

Slight: A lightweight authentication scheme for smart healthcare services.
Comput. Electr. Eng., 2022

Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions.
Big Data Cogn. Comput., 2022

A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions.
IEEE Access, 2022

BC-IoDT: blockchain-based framework for authentication in internet of drone things.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint.
Proceedings of the IEEE International Conference on Communications, 2022

2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021

PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service.
IEEE Trans. Veh. Technol., 2021

Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment.
ACM Trans. Internet Techn., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities.
IEEE Trans. Netw. Sci. Eng., 2021

CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU.
IEEE Trans. Netw. Sci. Eng., 2021

Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2021

Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique.
IEEE Trans. Intell. Transp. Syst., 2021

A Smart Cloud Service Management Algorithm for Vehicular Clouds.
IEEE Trans. Intell. Transp. Syst., 2021

Ant-Inspired Recurrent Deep Learning Model for Improving the Service Flow of Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications.
IEEE Trans. Intell. Transp. Syst., 2021

A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021

CDP-UA: Cognitive Data Processing Method Wearable Sensor Data Uncertainty Analysis in the Internet of Things Assisted Smart Medical Healthcare Systems.
IEEE J. Biomed. Health Informatics, 2021

Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021

Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments.
IEEE Trans. Ind. Informatics, 2021

Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

Machine Learning Assisted Information Management Scheme in Service Concentrated IoT.
IEEE Trans. Ind. Informatics, 2021

A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.
IEEE Trans. Ind. Informatics, 2021

Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.
IEEE Trans. Ind. Informatics, 2021

An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles.
IEEE Trans. Ind. Informatics, 2021

Multiagent Actor-Critic Network-Based Incentive Mechanism for Mobile Crowdsensing in Industrial Systems.
IEEE Trans. Ind. Informatics, 2021

Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks.
IEEE Trans. Ind. Informatics, 2021

AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center.
IEEE Trans. Green Commun. Netw., 2021

Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction.
Softw. Pract. Exp., 2021

Penetration testing framework for smart contract Blockchain.
Peer-to-Peer Netw. Appl., 2021

Real-time Fraud Detection in e-Market Using Machine Learning Algorithms.
J. Multiple Valued Log. Soft Comput., 2021

Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities.
Microprocess. Microsystems, 2021

A novel PCA-whale optimization-based deep neural network model for classification of tomato plant diseases using GPU.
J. Real Time Image Process., 2021

Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions.
J. Netw. Comput. Appl., 2021

Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain.
IEEE Internet Things J., 2021

Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things.
IEEE Internet Things J., 2021

RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack.
IEEE Internet Things J., 2021

On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021

Introduction to Special Issue on Future of Wireless Communication and 6G Networks.
Int. J. Wirel. Inf. Networks, 2021

Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

Novel Triplex Procedure for Ranking the Ability of Software Engineering Students Based on Two levels of AHP and Group TOPSIS Techniques.
Int. J. Inf. Technol. Decis. Mak., 2021

Interval type 2 trapezoidal-fuzzy weighted with zero inconsistency combined with VIKOR for evaluating smart e-tourism applications.
Int. J. Intell. Syst., 2021

Multidimensional benchmarking of the active queue management methods of network congestion control based on extension of fuzzy decision by opinion score method.
Int. J. Intell. Syst., 2021

AI and machine learning for the analysis of data flow characteristics in industrial network communication security.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Recent advances in blockchain technology: a survey on applications and challenges.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics.
Future Gener. Comput. Syst., 2021

An ensemble machine learning approach through effective feature extraction to classify fake news.
Future Gener. Comput. Syst., 2021

Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace.
Future Gener. Comput. Syst., 2021

A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem.
Future Gener. Comput. Syst., 2021

Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia.
Future Gener. Comput. Syst., 2021

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection.
Future Gener. Comput. Syst., 2021

Optimal 5G network slicing using machine learning and deep learning concepts.
Comput. Stand. Interfaces, 2021

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges.
CoRR, 2021

Genetic CFL: Optimization of Hyper-Parameters in Clustered Federated Learning.
CoRR, 2021

Question-Aware Memory Network for Multi-hop Question Answering in Human-Robot Interaction.
CoRR, 2021

Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions.
IEEE Commun. Surv. Tutorials, 2021

A secure and lightweight authentication scheme for next generation IoT infrastructure.
Comput. Commun., 2021

3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks.
Comput. Commun., 2021

Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning.
Comput. Intell. Neurosci., 2021

A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques.
Comput. Electr. Eng., 2021

An oppositional-Cauchy based GSK evolutionary algorithm with a novel deep ensemble reinforcement learning strategy for COVID-19 diagnosis.
Appl. Soft Comput., 2021

A Survey on LTE/LTE-A Radio Resource Allocation Techniques for Machine-to-Machine Communication for B5G Networks.
IEEE Access, 2021

A Survey on Energy Trading in the Smart Grid: Taxonomy, Research Challenges and Solutions.
IEEE Access, 2021

Message from the DependSys 2021 Program Chairs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Whale Optimization Algorithm With Applications to Resource Allocation in Wireless Networks.
IEEE Trans. Veh. Technol., 2020

Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV.
IEEE Trans. Veh. Technol., 2020

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2020

Differentially Private Tensor Train Deep Computation for Internet of Multimedia Things.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Securing smart vehicles from relay attacks using machine learning.
J. Supercomput., 2020

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud.
IEEE Trans. Ind. Informatics, 2020

MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning.
IEEE Trans. Computers, 2020

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.
Sensors, 2020

A Lightweight Signcryption Method for Perception Layer in Internet-of-Things.
J. Inf. Secur. Appl., 2020

Sum-Rate Maximization for UAV-Assisted Visible Light Communications Using NOMA: Swarm Intelligence Meets Machine Learning.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT.
IEEE Internet Things J., 2020

A lightweight IoT-based security framework for inventory automation using wireless sensor network.
Int. J. Commun. Syst., 2020

Delegated content erasure in IPFS.
Future Gener. Comput. Syst., 2020

Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.
Future Gener. Comput. Syst., 2020

Predicting likelihood of legitimate data loss in email DLP.
Future Gener. Comput. Syst., 2020

Socioscope: I know who you are, a robo, human caller or service number.
Future Gener. Comput. Syst., 2020

Next-generation big data federation access control: A reference model.
Future Gener. Comput. Syst., 2020

Intelligent mobile malware detection using permission requests and API calls.
Future Gener. Comput. Syst., 2020

mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects.
Comput. Sci. Rev., 2020

Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements and Challenges.
CoRR, 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

Image-Based malware classification using ensemble of CNN architectures (IMCEC).
Comput. Secur., 2020

ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020

An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture.
Comput. Commun., 2020

IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture.
Comput. Networks, 2020

Introduction to the special section on recent advances on blockchain infrastructures and applications.
Comput. Electr. Eng., 2020

Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata.
IEEE Access, 2020

Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges.
IEEE Access, 2020

A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks.
IEEE Access, 2020

A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City.
IEEE Access, 2020

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

Stochastic Neural Networks for Cryptocurrency Price Prediction.
IEEE Access, 2020

Blockchain for Industry 4.0: A Comprehensive Review.
IEEE Access, 2020

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges.
IEEE Access, 2020

A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid.
IEEE Access, 2020

A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction.
IEEE Access, 2020

Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Quality-aware trajectory planning of cellular connected UAVs.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

BioUAV: blockchain-envisioned framework for digital identification to secure access in next-generation UAVs.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Network Flow based IoT Botnet Attack Detection using Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Framework for Prediction and Storage of Battery Life in IoT Devices using DNN and Blockchain.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies.
IEEE Trans. Big Data, 2019

A hybrid deep learning image-based analysis for effective malware detection.
J. Inf. Secur. Appl., 2019

A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing.
IEEE Access, 2019

Robust Intelligent Malware Detection Using Deep Learning.
IEEE Access, 2019

Deep Learning Approach for Intelligent Intrusion Detection System.
IEEE Access, 2019

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model.
IEEE Access, 2019

A Comprehensive Survey for Intelligent Spam Email Detection.
IEEE Access, 2019

ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City.
IEEE Access, 2019

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data.
IEEE Access, 2019

A Comparative Analysis of Distributed Ledger Technology Platforms.
IEEE Access, 2019

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Poster: A Pluggable Authentication Module for Big Data Federation Architecture.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Ransomware Triage Using Deep Learning: Twitter as a Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

An Improved Convolutional Neural Network Model for Intrusion Detection in Networks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2018
Use of Data Visualisation for Zero-Day Malware Detection.
Secur. Commun. Networks, 2018

Disclosure of cyber security vulnerabilities: time series modelling.
Int. J. Electron. Secur. Digit. Forensics, 2018

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT.
CoRR, 2018

Secure Passive Keyless Entry and Start System Using Machine Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

2016
Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Gener. Comput. Syst., 2016

Fast authentication in wireless sensor networks.
Future Gener. Comput. Syst., 2016

Machine Learning Based Botnet Identification Traffic.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Exploiting Vulnerability Disclosures: Statistical Framework and Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Profiling and classifying the behavior of malicious codes.
J. Syst. Softw., 2015

From ZeuS to Zitmo: Trends in Banking Malware.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
A Hybrid Wrapper-Filter Approach for Malware Detection.
J. Networks, 2014

Using response action with intelligent intrusion detection and prevention system against web application malware.
Inf. Manag. Comput. Secur., 2014

2013
Detecting malicious behaviour using supervised learning algorithms of the function calls.
Int. J. Electron. Secur. Digit. Forensics, 2013

2012
Analysis of firewall log-based detection scenarios for evidence in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2012

Six Sigma Approach to Improve Quality in E-Services: An Empirical Study in Jordan.
Int. J. Electron. Gov. Res., 2012

2011
Cybercrime: The Case of Obfuscated Malware.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011

2009
Towards Automatic Image Segmentation Using Optimised Region Growing Technique.
Proceedings of the AI 2009: Advances in Artificial Intelligence, 2009


  Loading...