Mohammed M. Alani

Orcid: 0000-0002-4324-1774

According to our database1, Mohammed M. Alani authored at least 41 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HoneyTwin: Securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots.
J. Parallel Distributed Comput., 2024

Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
A two-stage cyber attack detection and classification system for smart grids.
Internet Things, December, 2023

ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning.
Internet Things, October, 2023

XMal: A lightweight memory-based explainable obfuscated-malware detector.
Comput. Secur., October, 2023

An explainable efficient flow-based Industrial IoT intrusion detection system.
Comput. Electr. Eng., May, 2023

An Intelligent Two-Layer Intrusion Detection System for the Internet of Things.
IEEE Trans. Ind. Informatics, 2023

XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning.
Sensors, 2023

Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems.
CoRR, 2023

A Survey of Smart Grid Intrusion Detection Datasets.
Proceedings of the Workshop Proceedings of the 19th International Conference on Intelligent Environments (IE2023), 2023

XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Towards an Explainable Universal Feature Set for IoT Intrusion Detection.
Sensors, 2022

Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks.
Trans. Emerg. Telecommun. Technol., 2022

AdStop: Efficient flow-based mobile adware detection using machine learning.
Comput. Secur., 2022

BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning.
Comput. Commun., 2022

A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems.
Comput. Networks, 2022

PhishNot: A Cloud-Based Machine-Learning Approach to Phishing URL Detection.
Comput. Networks, 2022

PAIRED: An Explainable Lightweight Android Malware Detection System.
IEEE Access, 2022

DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

IoTProtect: A Machine-Learning Based IoT Intrusion Detection System.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
Big data in cybersecurity: a survey of applications and future trends.
J. Reliab. Intell. Environ., 2021

Implementation-Oriented Feature Selection in UNSW-NB15 Intrusion Detection Dataset.
Proceedings of the Intelligent Systems Design and Applications, 2021

2020
Special issue on security, usability and sustainability of smart cities.
J. Reliab. Intell. Environ., 2020

Implementing IoT Lottery on Data Encryption Standard.
J. Commun., 2020

On Recent Security Issues in Machine Learning.
Proceedings of the 28th International Conference on Software, 2020

2019
Cybersecurity design considerations for cross-boundary clinical decision support.
J. Reliab. Intell. Environ., 2019

A systematic review on the status and progress of homomorphic encryption technologies.
J. Inf. Secur. Appl., 2019

Applications of machine learning in cryptography: a survey.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2018
IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Detecting NDP Distributed Denial of Service Attacks Using Machine Learning Algorithm Based on Flow-Based Representation.
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018

2017
Android Users Privacy Awareness Survey.
Int. J. Interact. Mob. Technol., 2017

Prioritizing Cloud Security Controls.
Proceedings of the Second International Conference on Advanced Wireless Information, 2017

Guide to Cisco Routers Configuration - Becoming a Router Geek, Second Edition
Springer, ISBN: 978-3-319-54629-2, 2017

2016
Elements of Cloud Computing Security - A Survey of Key Practicalities
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-41411-9, 2016

2014
Guide to OSI and TCP/IP Models
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-05152-9, 2014

MANET security: A survey.
Proceedings of the 2014 IEEE International Conference on Control System, 2014

2012
Neuro-cryptanalysis of DES.
Proceedings of the 2012 World Congress on Internet Security, 2012

Neuro-Cryptanalysis of DES and Triple-DES.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Guide to Cisco Routers Configuration - Becoming a Router Geek.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4471-4245-4, 2012


  Loading...