Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model

Ullah, F., Wang, J., Jabbar, S., Al-Turjman, F. & Alazab, M., 25 Sep 2019, In : IEEE Access. 7, p. 141987-141999 13 p., 8848478.

Research output: Contribution to journalArticle

Open Access

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticle

Open Access

Special Issue on: Cybersecurity in the Connected World

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorial

Open Access

Stochastic neural networks for cryptocurrency price prediction

Jay, P., Kalariya, V., Parmar, P., Tanwar, S., Kumar, N. & Alazab, M., 27 Apr 2020, In : IEEE Access. 8, p. 82804-82818 15 p., 9079491.

Research output: Contribution to journalArticle

Open Access
File
5 Downloads (Pure)

Sum-Rate Maximization for UAV-assisted Visible Light Communications using NOMA: Swarm Intelligence meets Machine Learning

Pham, Q-V., Thien, H-T., Alazab, M., Zhao, J. & Hwang, W-J., Oct 2020, In : IEEE Internet of Things Journal. 7, 10, p. 10375-10387 13 p.

Research output: Contribution to journalArticle

The malware detection challenge of accuracy

Akour, M., Alsmadi, I. & Alazab, M., 23 Feb 2017, 2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016. Beirut, Lebanon: IEEE, Institute of Electrical and Electronics Engineers, 6 p. 07863750

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

Iwendi, C., Khan, S., Anajemba, J. H., Mittal, M., Alenezi, M. & Alazab, M., 30 Apr 2020, In : Sensors (Basel, Switzerland). 20, 9, p. 1-37 37 p.

Research output: Contribution to journalArticle

Open Access
File
3 Downloads (Pure)

Toward Detection of Child Exploitation Material: A Forensic Approach

Islam, M., Watters, P., Mahmood, A. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer, p. 221-246 26 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud

Aladwan, M. N., Awaysheh, F. M., Alawadi, S., Alazab, M., Pena, T. F. & Cabaleiro, J. C., Sep 2020, In : IEEE Transactions on Industrial Informatics. 16, 9, p. 6203-6213 11 p., 8957615.

Research output: Contribution to journalArticle

Use of Data Visualisation for Zero-Day Malware Detection

Venkatraman, S. & Alazab, M., 2 Dec 2018, In : Security and Communication Networks. 2018, p. 1-14 14 p., 1728303.

Research output: Contribution to journalArticle

Open Access
File
99 Downloads (Pure)

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticle

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data

Ebenuwa, S. H., Sharif, M. S., Alazab, M. & Al-Nemrat, A., 25 Feb 2019, In : IEEE Access. 7, p. 24649-24666 18 p., 8651567.

Research output: Contribution to journalArticle

Open Access

Vulnerabilities analysis and security assessment framework for the internet of things

Shokeen, R., Shanmugam, B., Kannoorpatti, K., Azam, S., Jonkman, M. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 22-29 8 p. 8854555. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Welcome Message from the CCC 2017 General Chairs

Al-Nemrat, A. & Alazab, M., 9 Jan 2018, In : Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. 2018-September, p. vi-vi 1 p.

Research output: Contribution to journalEditorial

Whale Optimization Algorithm with Applications to Resource Allocation in Wireless Networks

Pham, Q. V., Mirjalili, S., Kumar, N., Alazab, M. & Hwang, W. J., Apr 2020, In : IEEE Transactions on Vehicular Technology. 69, 4, p. 4285-4297 13 p., 8993843.

Research output: Contribution to journalArticle