Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Whale Optimization Algorithm with Applications to Resource Allocation in Wireless Networks

Pham, Q. V., Mirjalili, S., Kumar, N., Alazab, M. & Hwang, W. J., Apr 2020, In : IEEE Transactions on Vehicular Technology. 69, 4, p. 4285-4297 13 p., 8993843.

Research output: Contribution to journalArticle

Welcome Message from the CCC 2017 General Chairs

Al-Nemrat, A. & Alazab, M., 9 Jan 2018, In : Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. 2018-September, p. vi-vi 1 p.

Research output: Contribution to journalEditorial

Vulnerabilities analysis and security assessment framework for the internet of things

Shokeen, R., Shanmugam, B., Kannoorpatti, K., Azam, S., Jonkman, M. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 22-29 8 p. 8854555. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data

Ebenuwa, S. H., Sharif, M. S., Alazab, M. & Al-Nemrat, A., 25 Feb 2019, In : IEEE Access. 7, p. 24649-24666 18 p., 8651567.

Research output: Contribution to journalArticle

Open Access

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticle

Use of Data Visualisation for Zero-Day Malware Detection

Venkatraman, S. & Alazab, M., 2 Dec 2018, In : Security and Communication Networks. 2018, p. 1-14 14 p., 1728303.

Research output: Contribution to journalArticle

Open Access
File
99 Downloads (Pure)

TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud

Aladwan, M. N., Awaysheh, F. M., Alawadi, S., Alazab, M., Pena, T. F. & Cabaleiro, J. C., Sep 2020, In : IEEE Transactions on Industrial Informatics. 16, 9, p. 6203-6213 11 p., 8957615.

Research output: Contribution to journalArticle

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Toward Detection of Child Exploitation Material: A Forensic Approach

Islam, M., Watters, P., Mahmood, A. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer, p. 221-246 26 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

Iwendi, C., Khan, S., Anajemba, J. H., Mittal, M., Alenezi, M. & Alazab, M., 30 Apr 2020, In : Sensors (Basel, Switzerland). 20, 9, p. 1-37 37 p.

Research output: Contribution to journalArticle

Open Access
File
3 Downloads (Pure)

The malware detection challenge of accuracy

Akour, M., Alsmadi, I. & Alazab, M., 23 Feb 2017, 2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016. Beirut, Lebanon: IEEE, Institute of Electrical and Electronics Engineers, 6 p. 07863750

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Sum-Rate Maximization for UAV-assisted Visible Light Communications using NOMA: Swarm Intelligence meets Machine Learning

Pham, Q-V., Thien, H-T., Alazab, M., Zhao, J. & Hwang, W-J., Oct 2020, In : IEEE Internet of Things Journal. 7, 10, p. 10375-10387 13 p.

Research output: Contribution to journalArticle

Stochastic neural networks for cryptocurrency price prediction

Jay, P., Kalariya, V., Parmar, P., Tanwar, S., Kumar, N. & Alazab, M., 27 Apr 2020, In : IEEE Access. 8, p. 82804-82818 15 p., 9079491.

Research output: Contribution to journalArticle

Open Access
File
5 Downloads (Pure)

Special Issue on: Cybersecurity in the Connected World

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorial

Open Access

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticle

Open Access

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model

Ullah, F., Wang, J., Jabbar, S., Al-Turjman, F. & Alazab, M., 25 Sep 2019, In : IEEE Access. 7, p. 141987-141999 13 p., 8848478.

Research output: Contribution to journalArticle

Open Access

Socioscope: I know who you are, a robo, human caller or service number

Azad, M. A., Alazab, M., Riaz, F., Arshad, J. & Abullah, T., Apr 2020, In : Future Generation Computer Systems. 105, p. 297-307 11 p.

Research output: Contribution to journalArticle

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticle

Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction

Asghar, M. Z., Subhan, F., Ahmad, H., Khan, W. Z., Hakak, S., Gadekallu, T. R. & Alazab, M., 3 Aug 2020, In : Software: Practice and Experience. p. 1-24 24 p., SPE2853.

Research output: Contribution to journalArticle

Securing smart vehicles from relay attacks using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Apr 2020, In : Journal of Supercomputing. 76, p. 2665-2682 18 p.

Research output: Contribution to journalArticle

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Dec 2018, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Proceedings. Yang, L. T., Wang, G. & Chen, J. (eds.). Springer-Verlag London Ltd., Vol. 11342. p. 304-313 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11342 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Robust Intelligent Malware Detection Using Deep Learning

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P. & Venkatraman, S., 18 Apr 2019, In : IEEE Access. 7, p. 46717-46738 22 p., 18616035 .

Research output: Contribution to journalArticle

Open Access

RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment

KUMAR, GULSHAN., SAHA, RAHUL., Geetha, G. & Alazab, M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 365-376 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection

Al-Rimy, B. A. S., Maarof, M. A., Alazab, M., Shaid, S. Z. M., Ghaleb, F. A., Almalawi, A., Ali, A. M. & Al-Hadhrami, T., 8 Oct 2020, In : Future Generation Computer Systems.

Research output: Contribution to journalArticle

Ransomware triage using deep learning: Twitter as a case study

Vinayakumar, V., Alazab, M., Jolfaei, A., Kp, S. & Poornachandran, P., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 67-73 7 p. 8854532. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Quality-aware trajectory planning of cellular connected UAVs

Sheikh, M. U., Riaz, M., Jameel, F., Jäntti, R., Sharma, N., Sharma, V. & Alazab, M., Sep 2020, DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond. Association for Computing Machinery, Inc, p. 79-85 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticle

Prediction of Landsliding using Univariate Forecasting Models

Aggarwal, A., Rani, A., Sharma, P., Kumar, M., Shankar, A. & Alazab, M., 11 Jul 2020, In : Internet Technology Letters. p. 1-6 6 p., e209.

Research output: Contribution to journalArticle

Open Access

Predicting likelihood of legitimate data loss in email DLP

Faiz, M. F., Arshad, J., Alazab, M. & Shalaginov, A., Sep 2020, In : Future Generation Computer Systems. 110, p. 744-757 14 p.

Research output: Contribution to journalArticle

Poster: A pluggable authentication module for big data federation architecture

Awaysheh, F. M., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 223-225 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Performance evaluation of e-government services using balanced scorecard: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Jul 2013, In : Benchmarking. 20, 4, p. 512-536 25 p.

Research output: Contribution to journalArticle

Penetration testing framework for smart contract Blockchain

Bhardwaj, A., Shah, S. B. H., Shankar, A., Alazab, M., Kumar, M. & Gadekallu, T. R., 5 Sep 2020, In : Peer-to-Peer Networking and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M. & Chon, S., 1 Jan 2014, In : International Journal of Cyber Criminology. 8, 1, p. 1-20 20 p.

Research output: Contribution to journalArticle

Open Access
File
71 Downloads (Pure)

On preserving privacy in cloud computing using ToR

Carnielli, A., Aiash, M. & Alazab, M., 13 Apr 2016, Pervasive Computing: Next Generation Platforms for Intelligent Data Collection. UK: Elsevier, p. 3-25 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Next-generation big data federation access control: A reference model

Awaysheh, F. M., Alazab, M., Gupta, M., Pena, T. F. & Cabaleiro, J. C., Jul 2020, In : Future Generation Computer Systems. 108, p. 726-741 16 p.

Research output: Contribution to journalArticle

Network flow based IoT botnet attack detection using deep learning

Sriram, S., Vinayakumar, R., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 189-194 6 p. 9162668. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Multi-scale learning based malware variant detection using spatial pyramid pooling network

Sriram, S., Vinayakumar, R., Sowmya, V., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 740-745 6 p. 9162661. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET

Ghaleb, F. A., Saeed, F., Al-Sarem, M., Al-Rimy, B. A. S., Boulila, W., Eljialy, A. E. M., Aloufi, K. & Alazab, M., 1 Sep 2020, In : Electronics . 9, 9, p. 1-17 17 p., 1411.

Research output: Contribution to journalArticle

Open Access
File

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects

Shuwandy, M. L., Zaidan, B. B., Zaidan, A. A., Albahri, A. S., Alamoodi, A. H., Albahri, O. S. & Alazab, M., Nov 2020, In : Computer Science Review. 38, p. 1-24 24 p., 10030.

Research output: Contribution to journalArticle

Message from the conference general chairs

Alazab, M. & Sleit, A., 18 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE Computer Society, p. vii-viii 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Shalaginov, A., Semeniuta, O. & Alazab, M., 2 Dec 2019, UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing. Association for Computing Machinery, Inc, p. 123-128 6 p. (UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Machine learning based botnet identification traffic

Azab, A., Alazab, M. & Aiash, M., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Tianjin, China: IEEE, Institute of Electrical and Electronics Engineers, p. 1788-1794 7 p. 7847158

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Maleh, Y. (ed.), Shojafar, M. (ed.), Alazab, M. (ed.) & Baddi, Y. (ed.), 2020, (Accepted/In press) Springer. 534 p. (Studies in Computational Intelligence; vol. 919)

Research output: Book/ReportEdited Book

Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata

Rajadurai, S., Alazab, M., Kumar, N. & Gadekallu, T. R., 30 Jul 2020, In : IEEE Access. 8, p. 140171-140180 10 p., 9153101.

Research output: Contribution to journalArticle

Open Access
File

Introduction to the special section on recent advances on blockchain infrastructures and applications

Salah, K., Al-Fuqaha, A., Alazab, M. & Umer, T., Jun 2020, In : Computers and Electrical Engineering. 84, p. 1-4 4 p., 106828.

Research output: Contribution to journalEditorial