Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Article

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticle

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection

Al-Rimy, B. A. S., Maarof, M. A., Alazab, M., Shaid, S. Z. M., Ghaleb, F. A., Almalawi, A., Ali, A. M. & Al-Hadhrami, T., 8 Oct 2020, In : Future Generation Computer Systems.

Research output: Contribution to journalArticle

Robust Intelligent Malware Detection Using Deep Learning

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P. & Venkatraman, S., 18 Apr 2019, In : IEEE Access. 7, p. 46717-46738 22 p., 18616035 .

Research output: Contribution to journalArticle

Open Access

Securing smart vehicles from relay attacks using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Apr 2020, In : Journal of Supercomputing. 76, p. 2665-2682 18 p.

Research output: Contribution to journalArticle

Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction

Asghar, M. Z., Subhan, F., Ahmad, H., Khan, W. Z., Hakak, S., Gadekallu, T. R. & Alazab, M., 3 Aug 2020, In : Software: Practice and Experience. p. 1-24 24 p., SPE2853.

Research output: Contribution to journalArticle

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticle

Socioscope: I know who you are, a robo, human caller or service number

Azad, M. A., Alazab, M., Riaz, F., Arshad, J. & Abullah, T., Apr 2020, In : Future Generation Computer Systems. 105, p. 297-307 11 p.

Research output: Contribution to journalArticle

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model

Ullah, F., Wang, J., Jabbar, S., Al-Turjman, F. & Alazab, M., 25 Sep 2019, In : IEEE Access. 7, p. 141987-141999 13 p., 8848478.

Research output: Contribution to journalArticle

Open Access

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticle

Open Access

Stochastic neural networks for cryptocurrency price prediction

Jay, P., Kalariya, V., Parmar, P., Tanwar, S., Kumar, N. & Alazab, M., 27 Apr 2020, In : IEEE Access. 8, p. 82804-82818 15 p., 9079491.

Research output: Contribution to journalArticle

Open Access
File
5 Downloads (Pure)

Sum-Rate Maximization for UAV-assisted Visible Light Communications using NOMA: Swarm Intelligence meets Machine Learning

Pham, Q-V., Thien, H-T., Alazab, M., Zhao, J. & Hwang, W-J., Oct 2020, In : IEEE Internet of Things Journal. 7, 10, p. 10375-10387 13 p.

Research output: Contribution to journalArticle

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

Iwendi, C., Khan, S., Anajemba, J. H., Mittal, M., Alenezi, M. & Alazab, M., 30 Apr 2020, In : Sensors (Basel, Switzerland). 20, 9, p. 1-37 37 p.

Research output: Contribution to journalArticle

Open Access
File
3 Downloads (Pure)

TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud

Aladwan, M. N., Awaysheh, F. M., Alawadi, S., Alazab, M., Pena, T. F. & Cabaleiro, J. C., Sep 2020, In : IEEE Transactions on Industrial Informatics. 16, 9, p. 6203-6213 11 p., 8957615.

Research output: Contribution to journalArticle

Use of Data Visualisation for Zero-Day Malware Detection

Venkatraman, S. & Alazab, M., 2 Dec 2018, In : Security and Communication Networks. 2018, p. 1-14 14 p., 1728303.

Research output: Contribution to journalArticle

Open Access
File
99 Downloads (Pure)

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticle

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data

Ebenuwa, S. H., Sharif, M. S., Alazab, M. & Al-Nemrat, A., 25 Feb 2019, In : IEEE Access. 7, p. 24649-24666 18 p., 8651567.

Research output: Contribution to journalArticle

Open Access

Whale Optimization Algorithm with Applications to Resource Allocation in Wireless Networks

Pham, Q. V., Mirjalili, S., Kumar, N., Alazab, M. & Hwang, W. J., Apr 2020, In : IEEE Transactions on Vehicular Technology. 69, 4, p. 4285-4297 13 p., 8993843.

Research output: Contribution to journalArticle

Chapter

A Blockchain-Based Secure Data Sharing Framework for Healthcare

Nowrozy, R., Kayes, A. S. M., Watters, P., Alazab, M., Ng, A., Chowdhury, M. & Maruatona, O., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 219-242 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

AmritaDGA: a comprehensive data set for domain generation algorithms (DGAs) based domain name detection systems and application of deep learning

Vinayakumar, R., Soman, K. P., Poornachandran, PRABAHARAN., Alazab, M. & Thampi, S., 2019, Big Data Recommender Systems - Volume 2: Application Paradigms. Khalid, O., Khan, S. U. & Zomaya, A. Y. (eds.). Institution of Engineering and Technology (IET), Vol. 2. p. 455-485 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

A Taxonomy of Blockchain Threats and Vulnerabilities

Alkhalifah, A., Ng, A., Kayes, A. S. M., Chowdhury, J., Alazab, M. & Watters, P., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 3-25 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

DBD: Deep Learning DGA-based Botnet Detection

Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Jolfaei, A., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 127-149 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks

Kumar, A. D., Thodupunoori, H., Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Venkatraman, S., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 151-173 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Ensuring Data Integrity: Towards a Blockchain-Based Platform to Share the Datasets

Islam, T., Kumar, D. K. T., Motiur Rahman, S. S. M., Jabiullah, M. I., Alazab, M. & Kayes, A. S. M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 323-338 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Forensic detection of child exploitation material using deep learning

Islam, M., Mahmood, A. N., Watters, P. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 211-219 9 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

On preserving privacy in cloud computing using ToR

Carnielli, A., Aiash, M. & Alazab, M., 13 Apr 2016, Pervasive Computing: Next Generation Platforms for Intelligent Data Collection. UK: Elsevier, p. 3-25 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment

KUMAR, GULSHAN., SAHA, RAHUL., Geetha, G. & Alazab, M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 365-376 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Toward Detection of Child Exploitation Material: A Forensic Approach

Islam, M., Watters, P., Mahmood, A. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer, p. 221-246 26 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Conference Paper published in Proceedings

A hybrid technique to detect botnets, based on P2P traffic similarity

Khan, R. U., Kumar, R., Alazab, M. & Zhang, X., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 136-142 7 p. 8854561. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

A Model Based Approach for the Extraction of Network Forensic Artifacts

Alsmadi, I. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 16-18 3 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

An improved convolutional neural network model for intrusion detection in networks

Khan, R. U., Zhang, X., Alazab, M. & Kumar, R., 3 Oct 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 74-77 4 p. 8854549. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

A reinforcement learning based algorithm towards energy efficient 5G multi-tier network

Islam, N., Alazab, A. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 96-101 6 p. 8854559. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Big data security frameworks meet the intelligent transportation systems trust challenges

Awaysheh, F., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 1 Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 807-813 7 p. 8887359. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

BioUAV: blockchain-envisioned framework for digital identification to secure access in next-generation UAVs

Patel, S. B., Kheruwala, H. A., Alazab, M., Patel, N., Damani, R., Bhattacharya, P., Tanwar, S. & Kumar, N., Sep 2020, DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond. Association for Computing Machinery, Inc, p. 43-48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Classification of Malware Using Visualisation of Similarity Matrices

Venkatraman, S. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 3-8 6 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Common security criteria for vehicular clouds and internet of vehicles evaluation and selection

Aladwan, M., Awaysheh, F., Cabaleiro, J., Pena, T., Alabool, H. & Alazab, M., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 814-820 7 p. 8887312. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Cybercrime: The case of obfuscated malware

Alazab, M., Venkatraman, S., Watters, P., Alazab, M. & Alazab, A., 7 Nov 2012, Global Security, Safety and Sustainability & e-Democracy. e-Democracy 2011, ICGS3 2011. Springer Berlin, p. 204-211 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV

Budhiraja, I., Kumar, N., Alazab, M., Tyagi, S., Tanwar, S. & Srivastava, G., Sep 2020, DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond. Association for Computing Machinery, Inc, p. 7-12 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Exploiting vulnerability disclosures: Statistical framework and case study

Tang, M., Alazab, M. & Luo, Y., 18 Oct 2016, Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. Amman, Jordan: IEEE, Institute of Electrical and Electronics Engineers, p. 117-122 6 p. 16397865

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Improving accessibility for mobility impaired people in smart city using crowdsourcing

Panta, Y. R., Azam, S., Shanmugam, B., Yeo, K. C., Jonkman, M., De Boer, F. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 47-55 9 p. 8854533. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Machine learning based botnet identification traffic

Azab, A., Alazab, M. & Aiash, M., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Tianjin, China: IEEE, Institute of Electrical and Electronics Engineers, p. 1788-1794 7 p. 7847158

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Shalaginov, A., Semeniuta, O. & Alazab, M., 2 Dec 2019, UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing. Association for Computing Machinery, Inc, p. 123-128 6 p. (UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Message from the conference general chairs

Alazab, M. & Sleit, A., 18 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE Computer Society, p. vii-viii 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Multi-scale learning based malware variant detection using spatial pyramid pooling network

Sriram, S., Vinayakumar, R., Sowmya, V., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 740-745 6 p. 9162661. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Network flow based IoT botnet attack detection using deep learning

Sriram, S., Vinayakumar, R., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 189-194 6 p. 9162668. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings