Mamoun Alazab

Assoc Prof

Accepting PhD Students

20122019
If you made any changes in Pure these will be visible here soon.

Personal profile

Research interests

Mamoun Alazab is an Associate Professor in the College of Engineering, IT and Environment, IT Discipline. He is acyber security researcher and practitioner with industry and academic experience. His research is multidisciplinary that focuses oncyber security and digital forensics of computer systems including current and emerging issues in the cyber environment like cyber-physical systems and internet of things, by taking into consideration the unique challenges present in these environments, with a focus on cybercrime detection and prevention. Assoc. Prof. Alazab received hisPhD degree in Computer Science and has more than 100 research papers. He presented at many invited keynotes talks and panels, at conferences and venues nationally and internationally (22 events in 2018 alone). He is a Senior Member of the IEEE. He is an editor on multiple editorial boards including Associate Editor of IEEE Access (2017 Impact Factor 3.557), Editor of the Security and Communication Networks Journal (2017 Impact Factor: 0.904) and Book Review Section Editor: Journal of Digital Forensics, Security and Law (JDFSL).

Fingerprint Dive into the research topics where Mamoun Alazab is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Learning systems Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Electronic mail Engineering & Materials Science
vulnerability Social Sciences
Classifiers Engineering & Materials Science
Internet Engineering & Materials Science
Authentication Engineering & Materials Science
Malware Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 17 Article
  • 14 Conference Paper published in Proceedings
  • 2 Chapter
  • 2 Editorial

A hybrid deep learning image-based analysis for effective malware detection

Venkatraman, S., Alazab, M. & Vinayakumar, R., 1 Aug 2019, In : Journal of Information Security and Applications. 47, p. 377-389 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Internet
Malware
Deep learning
Scalability
Classifiers
2 Downloads (Pure)

An adaptive multi-layer botnet detection technique using machine learning classifiers

Khan, R. U., Zhang, X., Kumar, R., Sharif, A., Golilarz, N. A. & Alazab, M., 11 Jun 2019, In : Applied Sciences (Switzerland). 9, 11, p. 1-22 22 p., 2375.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
machine learning
classifiers
traffic
Learning systems
Classifiers
13 Downloads (Pure)

Comparative study of indoor propagation model below and above 6 GHZ for 5G wireless networks

Al-Samman, A. M., Rahman, T. A., Al-Hadhrami, T., Daho, A., Hindia, MHD. H. D. N., Azmi, M. H., Dimyati, K. & Alazab, M., 1 Jan 2019, In : Electronics (Switzerland). 8, 1, p. 1-16 16 p., 44.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Wireless networks
Diffraction
Frequency bands
Horn antennas
Cellular radio systems

Deep Learning Approach for Intelligent Intrusion Detection System

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A. & Venkatraman, S., 3 Apr 2019, In : IEEE Access. 7, p. 41525-41550 26 p., 6287639.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Intrusion detection
Learning systems
Classifiers
Learning algorithms
Experiments

Poster: A pluggable authentication module for big data federation architecture

Awaysheh, F. M., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 223-225 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Authentication
Access control
Big data