Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2021

    AndroShow: A Large Scale Investigation to Identify the Pattern of Obfuscated Android Malware

    Russel, M. O. F. K., Rahman, S. S. M. M. & Alazab, M., 2021, Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). 1 ed. Cham, Switzerland: Springer Nature Switzerland AG, p. 191-216 26 p. (Studies in Computational Intelligence; vol. 919).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A Novel Deep Learning Model to Secure Internet of Things in Healthcare

    Ahmad, U., Song, H., Bilal, A., Mahmood, S., Alazab, M., Jolfaei, A., Ullah, A. & Saeed, U., 2021, Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). 1 ed. Cham, Switzerland: Springer Nature Switzerland AG, p. 341-353 13 p. (Studies in Computational Intelligence; vol. 919).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network

    Rahman, S. S. M. M., Gope, L., Islam, T. & Alazab, M., 2021, Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). 1 ed. Cham, Switzerland: Springer Nature Switzerland AG, p. 217-230 14 p. (Studies in Computational Intelligence; vol. 919).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Preface

    Maleh, Y., Baddi, Y., Shojafar, M. & Alazab, M., 2021, Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). Vol. 919. p. v-vi (Studies in Computational Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Spam Emails Detection Based on Distributed Word Embedding with Deep Learning

    Srinivasan, S., Ravi, V., Alazab, M., Ketha, S., Al-Zoubi, A. M. & Kotti Padannayil, S., 2021, Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). 1 ed. Switzerland: Springer Science and Business Media Deutschland GmbH, p. 161-189 29 p. (Studies in Computational Intelligence; vol. 919).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2020

    A Blockchain-Based Secure Data Sharing Framework for Healthcare

    Nowrozy, R., Kayes, A. S. M., Watters, P., Alazab, M., Ng, A., Chowdhury, M. & Maruatona, O., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). 1 ed. Boca Raton: CRC Press, p. 219-242 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A Taxonomy of Blockchain Threats and Vulnerabilities

    Alkhalifah, A., Ng, A., Kayes, A. S. M., Chowdhury, J., Alazab, M. & Watters, P., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). 1 ed. Boca Raton: CRC Press, p. 3-25 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Ensuring Data Integrity: Towards a Blockchain-Based Platform to Share the Datasets

    Islam, T., Kumar, D. K. T., Motiur Rahman, S. S. M., Jabiullah, M. I., Alazab, M. & Kayes, A. S. M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). 1 ed. Boca Raton: CRC Press, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment

    Kumar, G., Saha, R., Geetha, G. & Alazab, M., Aug 2020, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. Maleh, Y., Shojafar, M., Alazab, M. & Romdhani, I. (eds.). 1 ed. Boca Raton: CRC Press, p. 365-376 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2019

    AmritaDGA: A comprehensive data set for domain generation algorithms (DGAs) based domain name detection systems and application of deep learning

    Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Thampi, S. M., 1 Jan 2019, Big Data Recommender Systems: Application Paradigms. Khalid, O., Khan, S. U. & Zomaya, A. Y. (eds.). 1 ed. Stevenage: Institution of Engineering and Technology, Vol. 2. p. 455-485 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • DBD: Deep Learning DGA-based Botnet Detection

    Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Jolfaei, A., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). 1 ed. Switzerland: Springer Nature, p. 127-149 23 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Deep learning architecture for big data analytics in detecting intrusions and malicious URL

    Harikrishnan, N. B., Vinayakumar, R., Soman, K. P., Poornachandran, P., Annappa, B. & Alazab, M., 2019, Big Data Recommender Systems: Algorithms, Architectures, Big Data, Security and Trust. Khalid, O., Khan, S. & Zomaya, A. (eds.). 1 ed. Stevenage, UK: Institution of Engineering and Technology, Vol. 1. p. 303-336 34 p. (IET Professional Applications of Computing Series; vol. 35).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks

    Kumar, A. D., Thodupunoori, H., Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Venkatraman, S., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). 1 ed. Cham: Springer Nature, p. 151-173 23 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Forensic detection of child exploitation material using deep learning

    Islam, M., Mahmood, A. N., Watters, P. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). 1 ed. Cham: Springer Nature, p. 211-219 9 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Toward detection of child exploitation material: A forensic approach

    Islam, M., Watters, P., Mahmood, A. N. & Alazab, M., 2019, Advanced Sciences and Technologies for Security Applications. Alazab, M. & Tang, M. (eds.). 1 ed. Cham: Springer Nature, p. 221-246 26 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2016

    On preserving privacy in cloud computing using ToR

    Carnielli, A., Aiash, M. & Alazab, M., 13 Apr 2016, Pervasive Computing: Next Generation Platforms for Intelligent Data Collection. 1 ed. UK: Elsevier, p. 3-25 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2014

    Quality approaches for performance measurement in Jordanian E-government services

    Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review