Mamoun Alazab

Assoc Prof

Accepting PhD Students

20122019
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

Filter
Conference Paper published in Proceedings
2019

A hybrid technique to detect botnets, based on P2P traffic similarity

Khan, R. U., Kumar, R., Alazab, M. & Zhang, X., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 136-142 7 p. 8854561. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

traffic
conversation
hypertext
chat
centralization

An improved convolutional neural network model for intrusion detection in networks

Khan, R. U., Zhang, X., Alazab, M. & Kumar, R., 3 Oct 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 74-77 4 p. 8854549. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Intrusion detection
neural network
Neural networks
Learning systems
learning

A reinforcement learning based algorithm towards energy efficient 5G multi-tier network

Islam, N., Alazab, A. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 96-101 6 p. 8854559. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Reinforcement learning
reinforcement
Base stations
Energy efficiency
energy

Big data security frameworks meet the intelligent transportation systems trust challenges

Awaysheh, F., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 1 Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 807-813 7 p. 8887359. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Security of data
Security systems
Competitive intelligence
Learning systems
Big data

Common security criteria for vehicular clouds and internet of vehicles evaluation and selection

Aladwan, M., Awaysheh, F., Cabaleiro, J., Pena, T., Alabool, H. & Alazab, M., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 814-820 7 p. 8887312. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Internet
Electronic data interchange
Communication
Internet of things
World Wide Web

Improving accessibility for mobility impaired people in smart city using crowdsourcing

Panta, Y. R., Azam, S., Shanmugam, B., Yeo, K. C., Jonkman, M., De Boer, F. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 47-55 9 p. 8854533. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

disability
technology studies
Wheelchairs
open access
urban development

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Shalaginov, A., Semeniuta, O. & Alazab, M., Dec 2019, Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion. p. 123-128 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Learning systems
Neural networks
Controllers
Internet of things
Testing

Poster: A pluggable authentication module for big data federation architecture

Awaysheh, F. M., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 223-225 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Authentication
Access control
Big data

Ransomware triage using deep learning: Twitter as a case study

Vinayakumar, V., Alazab, M., Jolfaei, A., Kp, S. & Poornachandran, P., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 67-73 7 p. 8854532. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

twitter
social media
learning
incident
social network

Vulnerabilities analysis and security assessment framework for the internet of things

Shokeen, R., Shanmugam, B., Kannoorpatti, K., Azam, S., Jonkman, M. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 22-29 8 p. 8854555. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

vulnerability
Internet
International Sociological Association
Internet of things
interconnection
2018

A Model Based Approach for the Extraction of Network Forensic Artifacts

Alsmadi, I. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 16-18 3 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Packet networks
Switches
Digital forensics
Data storage equipment
Customization

Classification of Malware Using Visualisation of Similarity Matrices

Venkatraman, S. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 3-8 6 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Visualization
Malware
Software
Explosions
Big data

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Dec 2018, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Proceedings. Yang, L. T., Wang, G. & Chen, J. (eds.). Springer-Verlag London Ltd., Vol. 11342. p. 304-313 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11342 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Learning systems
Machine Learning
Relay
Attack
Supervised learning
2017

The malware detection challenge of accuracy

Akour, M., Alsmadi, I. & Alazab, M., 23 Feb 2017, 2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016. Beirut, Lebanon: IEEE, Institute of Electrical and Electronics Engineers, 6 p. 07863750

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Application programming interfaces (API)
Websites
Availability
Data mining
Learning systems
2016

Exploiting vulnerability disclosures: Statistical framework and case study

Tang, M., Alazab, M. & Luo, Y., 18 Oct 2016, Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. Amman, Jordan: IEEE, Institute of Electrical and Electronics Engineers, p. 117-122 6 p. 16397865

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

vulnerability
Time series
time series
Risk management
Acoustic waves

Machine learning based botnet identification traffic

Azab, A., Alazab, M. & Aiash, M., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Tianjin, China: IEEE, Institute of Electrical and Electronics Engineers, p. 1788-1794 7 p. 7847158

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Learning systems
Identification (control systems)
Botnet
HTTP
Cryptography

Message from the conference general chairs

Alazab, M. & Sleit, A., 18 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE Computer Society, p. vii-viii 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

event
2015

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Malware
Botnet

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Data mining
Malware
Internet
2013

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Predator
Communication
Anonymity
Chatter
Handwriting

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Penalized Splines
Malware
Splines
Obfuscation
Feature Selection

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Electronic mail
Crime
Websites
Internet
Syntactics

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Classifiers
Costs
Quality of service
Planning
Communication

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Electronic mail
Websites
Viruses
2012

Cybercrime: The case of obfuscated malware

Alazab, M., Venkatraman, S., Watters, P., Alazab, M. & Alazab, A., 7 Nov 2012, Global Security, Safety and Sustainability & e-Democracy. e-Democracy 2011, ICGS3 2011. Springer Berlin, p. 204-211 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Malware
Botnet