Moutaz Alazab

Orcid: 0000-0003-2823-4776

According to our database1, Moutaz Alazab authored at least 24 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhanced Android Ransomware Detection Through Hybrid Simultaneous Swarm-Based Optimization.
Cogn. Comput., September, 2024

Advances in Cybersecurity and Reliability.
Inf., June, 2024

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes.
Sensors, April, 2024

Natural language inference model for customer advocacy detection in online customer engagement.
Mach. Learn., April, 2024

Industry 4.0 Innovation: A Systematic Literature Review on the Role of Blockchain Technology in Creating Smart and Sustainable Manufacturing Facilities.
Inf., February, 2024

Android ransomware detection using binary Jaya optimization algorithm.
Expert Syst. J. Knowl. Eng., January, 2024

An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron.
CoRR, 2024

2023
Evolving Generative Adversarial Networks to improve image steganography.
Expert Syst. Appl., July, 2023

Improving Semantic Information Retrieval Using Multinomial Naive Bayes Classifier and Bayesian Networks.
Inf., May, 2023

CapGAN: Text-to-Image Synthesis Using Capsule GANs.
Inf., 2023

2022
Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Detection of Obfuscated Malicious JavaScript Code.
Future Internet, 2022

A new intrusion detection system based on Moth-Flame Optimizer algorithm.
Expert Syst. Appl., 2022

A discrete time-varying greywolf IoT botnet detection system.
Comput. Commun., 2022

New Evolutionary Selection Operators for Snake Optimizer.
Proceedings of the 14th International Joint Conference on Computational Intelligence, 2022

2021
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance.
Clust. Comput., 2021

2020
Intelligent mobile malware detection using permission requests and API calls.
Future Gener. Comput. Syst., 2020

2019
Trade-off among lean, agile, resilient and green paradigms: an empirical study on pharmaceutical industry in Jordan using a TOPSIS-entropy method.
Int. J. Adv. Oper. Manag., 2019

2012
Towards an understanding of the impact of advertising on data leaks.
Int. J. Secur. Networks, 2012

Six Sigma Approach to Improve Quality in E-Services: An Empirical Study in Jordan.
Int. J. Electron. Gov. Res., 2012

Using feature selection for intrusion detection system.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Analysis of Malicious and Benign Android Applications.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Cybercrime: The Case of Obfuscated Malware.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011


  Loading...