Mamoun Alazab

Assoc Prof

Accepting PhD Students

20122020
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2020

2016

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticleResearch

Open Access
larceny
fraud
law enforcement
new technology
vulnerability
2015

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Malware
Botnet

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Data mining
Malware
Internet

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Application programming interfaces (API)
Malware
Security of data
Computer networks
Learning systems
2014
14 Downloads (Pure)

Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M. & Chon, S., 1 Jan 2014, In : International Journal of Cyber Criminology. 8, 1, p. 1-20 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
offense
Group
offender
organized crime
organizational structure

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

performance measurement
electronic government
Balanced Scorecard
benchmarking
online service

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
vulnerability
Malware
Intrusion detection system
Web application
2013

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Predator
Communication
Anonymity
Chatter
Handwriting

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Penalized Splines
Malware
Splines
Obfuscation
Feature Selection

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Electronic mail
Crime
Websites
Internet
Syntactics

Performance evaluation of e-government services using balanced scorecard: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Jul 2013, In : Benchmarking. 20, 4, p. 512-536 25 p.

Research output: Contribution to journalArticleResearchpeer-review

Empirical study
Performance evaluation
Government services
Balanced score card
Electronic government

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Classifiers
Costs
Quality of service
Planning
Communication

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Electronic mail
Websites
Viruses
2012

Analysis of firewall log-based detection scenarios for evidence in digital forensics

Mukhtar, R., Al-Nemrat, A., Alazab, M., Venkatraman, S. & Jahankhani, H., Oct 2012, In : International Journal of Electronic Security and Digital Forensics. 4, 4, p. 261-279 19 p.

Research output: Contribution to journalArticleResearchpeer-review

scenario
evidence
determinants
research focus
Digital forensics

Cybercrime: The case of obfuscated malware

Alazab, M., Venkatraman, S., Watters, P., Alazab, M. & Alazab, A., 7 Nov 2012, Global Security, Safety and Sustainability & e-Democracy. e-Democracy 2011, ICGS3 2011. Springer Berlin, p. 204-211 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Malware
Botnet

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticleResearchpeer-review

Jordan
electronics
Developing countries
customer
Customer satisfaction