Qussai Yaseen
Orcid: 0000-0003-0777-1871
According to our database1,
Qussai Yaseen
authored at least 40 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Correction: AlJarrah et al. A Context-Aware Android Malware Detection Approach Using Machine Learning. Information 2022, 13, 563.
Inf., June, 2024
An Efficient Random Forest Classifier for Detecting Malicious Docker Images in Docker Hub Repository.
IEEE Access, 2024
2023
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models.
Inf., 2023
A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features.
IEEE Access, 2023
Proceedings of the 14th International Conference on Ambient Systems, 2023
2022
Inf., 2022
Detecting Spam Email with Machine Learning Optimized with Harris Hawks optimizer (HHO) Algorithm.
Proceedings of the 13th International Conference on Ambient Systems, 2022
2021
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System.
J. Netw. Syst. Manag., 2021
Proceedings of the 12th International Conference on Ambient Systems, 2021
Proceedings of the 12th International Conference on Ambient Systems, 2021
2020
Int. J. Adv. Intell. Paradigms, 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 11th International Conference on Ambient Systems, 2020
2019
Proceedings of the Second International Conference on Data Science, 2019
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019
A topology-based performance Evaluation for an adaptive tuning protocol for service and resource discovery in the Internet of Things.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019
2018
Multim. Tools Appl., 2018
Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2018
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018
2017
Int. J. Comput. Sci. Eng., 2017
Clust. Comput., 2017
2016
Secur. Commun. Networks, 2016
Ann. des Télécommunications, 2016
A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks.
Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
2015
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure.
Concurr. Comput. Pract. Exp., 2015
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the IEEE Fifth International Conference on Utility and Cloud Computing, 2012
Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
Proceedings of the Distributed Computing and Internet Technology, 2011
2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase.
Proceedings of the Fourth International Conference on Network and System Security, 2010
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009