Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2012

Analysis of firewall log-based detection scenarios for evidence in digital forensics

Mukhtar, R., Al-Nemrat, A., Alazab, M., Venkatraman, S. & Jahankhani, H., Oct 2012, In : International Journal of Electronic Security and Digital Forensics. 4, 4, p. 261-279 19 p.

Research output: Contribution to journalArticle

Cybercrime: The case of obfuscated malware

Alazab, M., Venkatraman, S., Watters, P., Alazab, M. & Alazab, A., 7 Nov 2012, Global Security, Safety and Sustainability & e-Democracy. e-Democracy 2011, ICGS3 2011. Springer Berlin, p. 204-211 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticle

2013

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Performance evaluation of e-government services using balanced scorecard: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Jul 2013, In : Benchmarking. 20, 4, p. 512-536 25 p.

Research output: Contribution to journalArticle

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

2014

Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M. & Chon, S., 1 Jan 2014, In : International Journal of Cyber Criminology. 8, 1, p. 1-20 20 p.

Research output: Contribution to journalArticle

Open Access
File
67 Downloads (Pure)

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticle

2015

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticle

2016

Exploiting vulnerability disclosures: Statistical framework and case study

Tang, M., Alazab, M. & Luo, Y., 18 Oct 2016, Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. Amman, Jordan: IEEE, Institute of Electrical and Electronics Engineers, p. 117-122 6 p. 16397865

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Fast authentication in wireless sensor networks

Benzaid, C., Lounis, K., Al-Nemrat, A., Badache, N. & Alazab, M., Feb 2016, In : Future Generation Computer Systems. 55, p. 362-375 14 p.

Research output: Contribution to journalArticle

Hybrids of support vector machine wrapper and filter based framework for malware detection

Huda, S., Abawajy, J., Alazab, M., Abdollalihian, M., Islam, R. & Yearwood, J., Feb 2016, In : Future Generation Computer Systems. 55, p. 376-390 15 p.

Research output: Contribution to journalArticle

Machine learning based botnet identification traffic

Azab, A., Alazab, M. & Aiash, M., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Tianjin, China: IEEE, Institute of Electrical and Electronics Engineers, p. 1788-1794 7 p. 7847158

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Message from the conference general chairs

Alazab, M. & Sleit, A., 18 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE Computer Society, p. vii-viii 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

On preserving privacy in cloud computing using ToR

Carnielli, A., Aiash, M. & Alazab, M., 13 Apr 2016, Pervasive Computing: Next Generation Platforms for Intelligent Data Collection. UK: Elsevier, p. 3-25 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticle

Open Access
2017

Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies

Tang, M., Alazab, M. & Luo, Y., 5 Jul 2017, In : IEEE Transactions on Big Data. 5, 3, p. 317-329 13 p.

Research output: Contribution to journalArticle

The malware detection challenge of accuracy

Akour, M., Alsmadi, I. & Alazab, M., 23 Feb 2017, 2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016. Beirut, Lebanon: IEEE, Institute of Electrical and Electronics Engineers, 6 p. 07863750

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

2018

A Model Based Approach for the Extraction of Network Forensic Artifacts

Alsmadi, I. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 16-18 3 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Classification of Malware Using Visualisation of Similarity Matrices

Venkatraman, S. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 3-8 6 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Disclosure of cyber security vulnerabilities: Time series modelling

Tang, M. J., Alazab, M., Luo, Y. & Donlon, M., 1 Jan 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 255-275 21 p.

Research output: Contribution to journalArticle

Editorial

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 1 Jan 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorial

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Dec 2018, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Proceedings. Yang, L. T., Wang, G. & Chen, J. (eds.). Springer-Verlag London Ltd., Vol. 11342. p. 304-313 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11342 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Special Issue on: Cybersecurity in the Connected World

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorial

Open Access

Use of Data Visualisation for Zero-Day Malware Detection

Venkatraman, S. & Alazab, M., 2 Dec 2018, In : Security and Communication Networks. 2018, p. 1-14 14 p., 1728303.

Research output: Contribution to journalArticle

Open Access
File
94 Downloads (Pure)

Welcome Message from the CCC 2017 General Chairs

Al-Nemrat, A. & Alazab, M., 9 Jan 2018, In : Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. 2018-September, p. vi-vi 1 p.

Research output: Contribution to journalEditorial

2019

A Comparative Analysis of Distributed Ledger Technology Platforms

Chowdhury, M., Ferdous, S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Alazab, M. & Watters, P., 15 Nov 2019, In : IEEE Access. 7, p. 167930-167943 14 p.

Research output: Contribution to journalArticle

Open Access

A Comprehensive Survey for Intelligent Spam Email Detection

Karim, A., Azam, S., Shanmugam, B., Krishnan, K. & Alazab, M., 20 Nov 2019, In : IEEE Access. 7, p. 168261-168295 35 p., 08907831.

Research output: Contribution to journalArticle

Open Access
File
151 Downloads (Pure)

A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing

Zhang, H., Jolfaei, A. & Alazab, M., 28 Oct 2019, In : IEEE Access. 7, p. 159081-159089 9 p., 08884205.

Research output: Contribution to journalArticle

Open Access

A hybrid deep learning image-based analysis for effective malware detection

Venkatraman, S., Alazab, M. & Vinayakumar, R., 1 Aug 2019, In : Journal of Information Security and Applications. 47, p. 377-389 13 p.

Research output: Contribution to journalArticle

A hybrid technique to detect botnets, based on P2P traffic similarity

Khan, R. U., Kumar, R., Alazab, M. & Zhang, X., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 136-142 7 p. 8854561. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

AmritaDGA: a comprehensive data set for domain generation algorithms (DGAs) based domain name detection systems and application of deep learning

Vinayakumar, R., Soman, K. P., Poornachandran, PRABAHARAN., Alazab, M. & Thampi, S., 2019, Big Data Recommender Systems - Volume 2: Application Paradigms. Khalid, O., Khan, S. U. & Zomaya, A. Y. (eds.). Institution of Engineering and Technology (IET), Vol. 2. p. 455-485 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

An adaptive multi-layer botnet detection technique using machine learning classifiers

Khan, R. U., Zhang, X., Kumar, R., Sharif, A., Golilarz, N. A. & Alazab, M., 11 Jun 2019, In : Applied Sciences (Switzerland). 9, 11, p. 1-22 22 p., 2375.

Research output: Contribution to journalArticle

Open Access
File
26 Downloads (Pure)

An improved convolutional neural network model for intrusion detection in networks

Khan, R. U., Zhang, X., Alazab, M. & Kumar, R., 3 Oct 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 74-77 4 p. 8854549. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

A reinforcement learning based algorithm towards energy efficient 5G multi-tier network

Islam, N., Alazab, A. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 96-101 6 p. 8854559. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

A review of automatic phenotyping approaches using electronic health records

Alzoubi, H., Alzubi, R., Ramzan, N., West, D., Al-Hadhrami, T. & Alazab, M., 29 Oct 2019, In : Electronics . 8, 11, p. 1-23 23 p., 1235.

Research output: Contribution to journalArticle

Open Access
File
4 Downloads (Pure)

Big data security frameworks meet the intelligent transportation systems trust challenges

Awaysheh, F., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 1 Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 807-813 7 p. 8887359. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Common security criteria for vehicular clouds and internet of vehicles evaluation and selection

Aladwan, M., Awaysheh, F., Cabaleiro, J., Pena, T., Alabool, H. & Alazab, M., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 814-820 7 p. 8887312. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Comparative study of indoor propagation model below and above 6 GHZ for 5G wireless networks

Al-Samman, A. M., Rahman, T. A., Al-Hadhrami, T., Daho, A., Hindia, MHD. H. D. N., Azmi, M. H., Dimyati, K. & Alazab, M., 1 Jan 2019, In : Electronics (Switzerland). 8, 1, p. 1-16 16 p., 44.

Research output: Contribution to journalArticle

Open Access
File
37 Downloads (Pure)

DBD: Deep Learning DGA-based Botnet Detection

Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Jolfaei, A., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 127-149 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Deep Learning Applications for Cyber Security

Alazab, M. (ed.) & Tang, M. (ed.), 2019, Switzerland: Springer, Cham. 246 p. (Advanced Sciences and Technologies for Security Applications)

Research output: Book/ReportEdited Book

Deep Learning Approach for Intelligent Intrusion Detection System

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A. & Venkatraman, S., 3 Apr 2019, In : IEEE Access. 7, p. 41525-41550 26 p., 6287639.

Research output: Contribution to journalArticle

Open Access

ECA: An edge computing architecture for privacy-preserving in IoT-Based smart city

Gheisari, M., Pham, Q. V., Alazab, M., Zhang, X., Fernandez-Campusano, C. & Srivastava, G., 6 Nov 2019, In : IEEE Access. 7, p. 155779-155786 8 p., 8811469.

Research output: Contribution to journalArticle

Open Access

Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks

Kumar, A. D., Thodupunoori, H., Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Venkatraman, S., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 151-173 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter