Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Enabling the content dissemination through caching in the state-of-the-art sustainable information and communication technologies

Naeem, M. A., Ali, R., Alazab, M., Yhui, M. & Zikria, Y. B., Oct 2020, In : Sustainable Cities and Society. 61, p. 1-14 14 p., 102291.

Research output: Contribution to journalArticle

Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV

Budhiraja, I., Kumar, N., Alazab, M., Tyagi, S., Tanwar, S. & Srivastava, G., Sep 2020, DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond. Association for Computing Machinery, Inc, p. 7-12 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks

Kumar, A. D., Thodupunoori, H., Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Venkatraman, S., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 151-173 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Ensuring Data Integrity: Towards a Blockchain-Based Platform to Share the Datasets

Islam, T., Kumar, D. K. T., Motiur Rahman, S. S. M., Jabiullah, M. I., Alazab, M. & Kayes, A. S. M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 323-338 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Exploiting vulnerability disclosures: Statistical framework and case study

Tang, M., Alazab, M. & Luo, Y., 18 Oct 2016, Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. Amman, Jordan: IEEE, Institute of Electrical and Electronics Engineers, p. 117-122 6 p. 16397865

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges

Patel, K., Mehta, D., Mistry, C., Gupta, R., Tanwar, S., Kumar, N. & Alazab, M., 11 May 2020, In : IEEE Access. 8, p. 90495-90519 25 p., 9091188.

Research output: Contribution to journalArticle

Open Access
File
7 Downloads (Pure)

Fast authentication in wireless sensor networks

Benzaid, C., Lounis, K., Al-Nemrat, A., Badache, N. & Alazab, M., Feb 2016, In : Future Generation Computer Systems. 55, p. 362-375 14 p.

Research output: Contribution to journalArticle

Forensic detection of child exploitation material using deep learning

Islam, M., Mahmood, A. N., Watters, P. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 211-219 9 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT

Jolfaei, A., Ostovari, P., Alazab, M., Gondal, I. & Kant, K., Apr 2020, In : IEEE Internet of Things Journal. 7, 4, p. 2496-2500 5 p., 9067768.

Research output: Contribution to journalEditorial

Hybrids of support vector machine wrapper and filter based framework for malware detection

Huda, S., Abawajy, J., Alazab, M., Abdollalihian, M., Islam, R. & Yearwood, J., Feb 2016, In : Future Generation Computer Systems. 55, p. 376-390 15 p.

Research output: Contribution to journalArticle

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Image-Based malware classification using ensemble of CNN architectures (IMCEC)

Vasan, D., Alazab, M., Wassan, S., Safaei, B. & Zheng, Q., May 2020, In : Computers and Security. 92, p. 1-12 12 p., 101748.

Research output: Contribution to journalArticle

IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture

Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B. & Zheng, Q., 22 Apr 2020, In : Computer Networks. 171, 20 p., 107138.

Research output: Contribution to journalArticle

Improving accessibility for mobility impaired people in smart city using crowdsourcing

Panta, Y. R., Azam, S., Shanmugam, B., Yeo, K. C., Jonkman, M., De Boer, F. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 47-55 9 p. 8854533. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Intelligent mobile malware detection using permission requests and API calls

Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A. & Awajan, A., Jun 2020, In : Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 107, p. 509-521 13 p.

Research output: Contribution to journalArticle

Introduction to the special section on recent advances on blockchain infrastructures and applications

Salah, K., Al-Fuqaha, A., Alazab, M. & Umer, T., Jun 2020, In : Computers and Electrical Engineering. 84, p. 1-4 4 p., 106828.

Research output: Contribution to journalEditorial

Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata

Rajadurai, S., Alazab, M., Kumar, N. & Gadekallu, T. R., 30 Jul 2020, In : IEEE Access. 8, p. 140171-140180 10 p., 9153101.

Research output: Contribution to journalArticle

Open Access
File

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Maleh, Y. (ed.), Shojafar, M. (ed.), Alazab, M. (ed.) & Baddi, Y. (ed.), 2020, (Accepted/In press) Springer. 534 p. (Studies in Computational Intelligence; vol. 919)

Research output: Book/ReportEdited Book

Machine learning based botnet identification traffic

Azab, A., Alazab, M. & Aiash, M., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Tianjin, China: IEEE, Institute of Electrical and Electronics Engineers, p. 1788-1794 7 p. 7847158

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Shalaginov, A., Semeniuta, O. & Alazab, M., 2 Dec 2019, UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing. Association for Computing Machinery, Inc, p. 123-128 6 p. (UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Message from the conference general chairs

Alazab, M. & Sleit, A., 18 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE Computer Society, p. vii-viii 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects

Shuwandy, M. L., Zaidan, B. B., Zaidan, A. A., Albahri, A. S., Alamoodi, A. H., Albahri, O. S. & Alazab, M., Nov 2020, In : Computer Science Review. 38, p. 1-24 24 p., 10030.

Research output: Contribution to journalArticle

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET

Ghaleb, F. A., Saeed, F., Al-Sarem, M., Al-Rimy, B. A. S., Boulila, W., Eljialy, A. E. M., Aloufi, K. & Alazab, M., 1 Sep 2020, In : Electronics . 9, 9, p. 1-17 17 p., 1411.

Research output: Contribution to journalArticle

Open Access
File

Multi-scale learning based malware variant detection using spatial pyramid pooling network

Sriram, S., Vinayakumar, R., Sowmya, V., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 740-745 6 p. 9162661. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Network flow based IoT botnet attack detection using deep learning

Sriram, S., Vinayakumar, R., Alazab, M. & Soman, K. P., Jul 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020. IEEE, Institute of Electrical and Electronics Engineers, p. 189-194 6 p. 9162668. (IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Next-generation big data federation access control: A reference model

Awaysheh, F. M., Alazab, M., Gupta, M., Pena, T. F. & Cabaleiro, J. C., Jul 2020, In : Future Generation Computer Systems. 108, p. 726-741 16 p.

Research output: Contribution to journalArticle

On preserving privacy in cloud computing using ToR

Carnielli, A., Aiash, M. & Alazab, M., 13 Apr 2016, Pervasive Computing: Next Generation Platforms for Intelligent Data Collection. UK: Elsevier, p. 3-25 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M. & Chon, S., 1 Jan 2014, In : International Journal of Cyber Criminology. 8, 1, p. 1-20 20 p.

Research output: Contribution to journalArticle

Open Access
File
71 Downloads (Pure)

Penetration testing framework for smart contract Blockchain

Bhardwaj, A., Shah, S. B. H., Shankar, A., Alazab, M., Kumar, M. & Gadekallu, T. R., 5 Sep 2020, In : Peer-to-Peer Networking and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Performance evaluation of e-government services using balanced scorecard: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Jul 2013, In : Benchmarking. 20, 4, p. 512-536 25 p.

Research output: Contribution to journalArticle

Poster: A pluggable authentication module for big data federation architecture

Awaysheh, F. M., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 223-225 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Predicting likelihood of legitimate data loss in email DLP

Faiz, M. F., Arshad, J., Alazab, M. & Shalaginov, A., Sep 2020, In : Future Generation Computer Systems. 110, p. 744-757 14 p.

Research output: Contribution to journalArticle

Prediction of Landsliding using Univariate Forecasting Models

Aggarwal, A., Rani, A., Sharma, P., Kumar, M., Shankar, A. & Alazab, M., 11 Jul 2020, In : Internet Technology Letters. p. 1-6 6 p., e209.

Research output: Contribution to journalArticle

Open Access

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticle

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Quality-aware trajectory planning of cellular connected UAVs

Sheikh, M. U., Riaz, M., Jameel, F., Jäntti, R., Sharma, N., Sharma, V. & Alazab, M., Sep 2020, DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond. Association for Computing Machinery, Inc, p. 79-85 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Ransomware triage using deep learning: Twitter as a case study

Vinayakumar, V., Alazab, M., Jolfaei, A., Kp, S. & Poornachandran, P., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 67-73 7 p. 8854532. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection

Al-Rimy, B. A. S., Maarof, M. A., Alazab, M., Shaid, S. Z. M., Ghaleb, F. A., Almalawi, A., Ali, A. M. & Al-Hadhrami, T., 8 Oct 2020, In : Future Generation Computer Systems.

Research output: Contribution to journalArticle

RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment

KUMAR, GULSHAN., SAHA, RAHUL., Geetha, G. & Alazab, M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). CRC Press, p. 365-376 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Robust Intelligent Malware Detection Using Deep Learning

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P. & Venkatraman, S., 18 Apr 2019, In : IEEE Access. 7, p. 46717-46738 22 p., 18616035 .

Research output: Contribution to journalArticle

Open Access

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Dec 2018, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Proceedings. Yang, L. T., Wang, G. & Chen, J. (eds.). Springer-Verlag London Ltd., Vol. 11342. p. 304-313 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11342 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Securing smart vehicles from relay attacks using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Apr 2020, In : Journal of Supercomputing. 76, p. 2665-2682 18 p.

Research output: Contribution to journalArticle

Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction

Asghar, M. Z., Subhan, F., Ahmad, H., Khan, W. Z., Hakak, S., Gadekallu, T. R. & Alazab, M., 3 Aug 2020, In : Software: Practice and Experience. p. 1-24 24 p., SPE2853.

Research output: Contribution to journalArticle

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticle

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Socioscope: I know who you are, a robo, human caller or service number

Azad, M. A., Alazab, M., Riaz, F., Arshad, J. & Abullah, T., Apr 2020, In : Future Generation Computer Systems. 105, p. 297-307 11 p.

Research output: Contribution to journalArticle