Find Research Outputs

Search concepts
Selected filters
2020

A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network

Wang, S., Wang, H., Li, J., Wang, H., Chaudhry, J., Alazab, M. & Song, H., 8 Jan 2020, In : IEEE Transactions on Industry Applications.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Data privacy
Cloud computing
Communication
Sensors

ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media

Taleby Ahvanooey, M., Li, Q., Zhu, X., Alazab, M. & Zhang, J., Mar 2020, In : Computers and Security. 90, p. 1-14 14 p., 101702.

Research output: Contribution to journalArticleResearchpeer-review

Watermarking
social media
Digital watermarking
Digital storage
Learning algorithms
13 Downloads (Pure)

A Novel PCA-Firefly based XGBoost classification model for Intrusion Detection in Networks using GPU

Bhattacharya, S., Ramakrishnan, S., M, P. K. R., Kaluri, R., Singh, S., Reddy G, T., Alazab, M. & Tariq, U., 27 Jan 2020, In : Electronics . 9, 2, p. 1-17 17 p., 219.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Intrusion detection
Principal component analysis
Learning systems
Graphics processing unit
Internet

Early detection of diabetic retinopathy using pca-firefly based deep learning model

Gadekallu, T. R., Khare, N., Bhattacharya, S., Singh, S., Maddikunta, P. K. R., Ra, I. H. & Alazab, M., Feb 2020, In : Electronics (Switzerland). 9, 2, p. 1-16 16 p., 274.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Learning systems
Medical problems
Angiography
Optical tomography
Principal component analysis

Intelligent mobile malware detection using permission requests and API calls

Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A. & Awajan, A., 5 Feb 2020, In : Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.

Research output: Contribution to journalArticleResearchpeer-review

Application programs
Interfaces (computer)
Malware
Application programming interfaces (API)
Mobile devices

Socioscope: I know who you are, a robo, human caller or service number

Azad, M. A., Alazab, M., Riaz, F., Arshad, J. & Abullah, T., Apr 2020, In : Future Generation Computer Systems. 105, p. 297-307 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Cellular telephone systems
Decision trees
Telephone
Marketing
Systems analysis

TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud

Aladwan, M., Awaysheh, F. M., Alazab, M., Alawadi, S., Pena, T. F. & Cabaleiro, J. C., 13 Jan 2020, In : IEEE Transactions on Industrial Informatics. p. 1-11 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Data privacy
Vehicular ad hoc networks
Cloud computing
Agglomeration
Decision making
2019

A Comparative Analysis of Distributed Ledger Technology Platforms

Chowdhury, M., Ferdous, S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Alazab, M. & Watters, P., 15 Nov 2019, In : IEEE Access. 7, p. 167930-167943 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Data privacy
Sustainable development
Industry
3 Downloads (Pure)

A Comprehensive Survey for Intelligent Spam Email Detection

Karim, A., Azam, S., Shanmugam, B., Krishnan, K. & Alazab, M., 20 Nov 2019, In : IEEE Access. 7, p. 168261-168295 35 p., 08907831.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Electronic mail
Artificial intelligence
Learning systems

A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing

Zhang, H., Jolfaei, A. & Alazab, M., 28 Oct 2019, In : IEEE Access. 7, p. 159081-159089 9 p., 08884205.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Face recognition
Neural networks
Edge detection
Convolution
Feature extraction

A hybrid deep learning image-based analysis for effective malware detection

Venkatraman, S., Alazab, M. & Vinayakumar, R., 1 Aug 2019, In : Journal of Information Security and Applications. 47, p. 377-389 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Internet
Malware
Deep learning
Scalability
Classifiers

A hybrid technique to detect botnets, based on P2P traffic similarity

Khan, R. U., Kumar, R., Alazab, M. & Zhang, X., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 136-142 7 p. 8854561. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

traffic
conversation
hypertext
chat
centralization

A lightweight IoT-based security framework for inventory automation using wireless sensor network

Batra, I., Verma, S., Kavita & Alazab, M., 29 Oct 2019, In : International Journal of Communication Systems. e4228.

Research output: Contribution to journalArticleResearchpeer-review

Wireless sensor networks
Automation
Information management
Authentication
Program processors

AmritaDGA: a comprehensive data set for domain generation algorithms (DGAs) based domain name detection systems and application of deep learning

Vinayakumar, R., Soman, K. P., Poornachandran, PRABAHARAN., Alazab, M. & Thampi, S., 2019, Big Data Recommender Systems - Volume 2: Application Paradigms. Khalid, O., Khan, S. U. & Zomaya, A. Y. (eds.). Institution of Engineering and Technology (IET), Vol. 2. p. 455-485 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Fluxes
Internet protocols
Seed
Servers
Internet
10 Downloads (Pure)

An adaptive multi-layer botnet detection technique using machine learning classifiers

Khan, R. U., Zhang, X., Kumar, R., Sharif, A., Golilarz, N. A. & Alazab, M., 11 Jun 2019, In : Applied Sciences (Switzerland). 9, 11, p. 1-22 22 p., 2375.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
machine learning
classifiers
traffic
Learning systems
Classifiers

An improved convolutional neural network model for intrusion detection in networks

Khan, R. U., Zhang, X., Alazab, M. & Kumar, R., 3 Oct 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 74-77 4 p. 8854549. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Intrusion detection
neural network
Neural networks
Learning systems
learning

A reinforcement learning based algorithm towards energy efficient 5G multi-tier network

Islam, N., Alazab, A. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 96-101 6 p. 8854559. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Reinforcement learning
reinforcement
Base stations
Energy efficiency
energy

A review of automatic phenotyping approaches using electronic health records

Alzoubi, H., Alzubi, R., Ramzan, N., West, D., Al-Hadhrami, T. & Alazab, M., 29 Oct 2019, In : Electronics . 8, 11, p. 1-23 23 p., 1235.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Health
Processing
Learning systems
Throughput
Availability

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber Physical Systems and Industrial IoT

Farivar, F., Haghighi, M. S., Jolfaei, A. & Alazab, M., 28 Nov 2019, In : IEEE Transactions on Industrial Informatics. 16, 4, p. 2716-2725 10 p., 8917652.

Research output: Contribution to journalArticleResearchpeer-review

Intelligent control
Artificial intelligence
Cruise control
Neural networks
Nonlinear control systems

Big data security frameworks meet the intelligent transportation systems trust challenges

Awaysheh, F., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 1 Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 807-813 7 p. 8887359. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Security of data
Security systems
Competitive intelligence
Learning systems
Big data

Common security criteria for vehicular clouds and internet of vehicles evaluation and selection

Aladwan, M., Awaysheh, F., Cabaleiro, J., Pena, T., Alabool, H. & Alazab, M., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 814-820 7 p. 8887312. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Internet
Electronic data interchange
Communication
Internet of things
World Wide Web
19 Downloads (Pure)

Comparative study of indoor propagation model below and above 6 GHZ for 5G wireless networks

Al-Samman, A. M., Rahman, T. A., Al-Hadhrami, T., Daho, A., Hindia, MHD. H. D. N., Azmi, M. H., Dimyati, K. & Alazab, M., 1 Jan 2019, In : Electronics (Switzerland). 8, 1, p. 1-16 16 p., 44.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Wireless networks
Diffraction
Frequency bands
Horn antennas
Cellular radio systems

DBD: Deep Learning DGA-based Botnet Detection

Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Jolfaei, A., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 127-149 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Internet
Reverse engineering
Inspection
Deep learning
Botnet

Deep Learning Applications for Cyber Security

Alazab, M. (ed.) & Tang, M. (ed.), 2019, Switzerland: Springer, Cham. 246 p. (Advanced Sciences and Technologies for Security Applications)

Research output: Book/ReportEdited BookResearch

Intrusion detection
Security systems
Deep learning
Monitoring

Deep Learning Approach for Intelligent Intrusion Detection System

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A. & Venkatraman, S., 3 Apr 2019, In : IEEE Access. 7, p. 41525-41550 26 p., 6287639.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Intrusion detection
Learning systems
Classifiers
Learning algorithms
Experiments

ECA: An edge computing architecture for privacy-preserving in IoT-Based smart city

Gheisari, M., Pham, Q. V., Alazab, M., Zhang, X., Fernandez-Campusano, C. & Srivastava, G., 6 Nov 2019, In : IEEE Access. 7, p. 155779-155786 8 p., 8811469.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Ontology
Studios
Data structures
Smart city
Internet of things

Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks

Kumar, A. D., Thodupunoori, H., Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Venkatraman, S., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 151-173 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Recurrent neural networks
Detectors
Neural networks
Deep neural networks
Reverse engineering

Forensic detection of child exploitation material using deep learning

Islam, M., Mahmood, A. N., Watters, P. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer Nature, p. 211-219 9 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Face recognition
Learning systems
exploitation
Skin
Textures

Improving accessibility for mobility impaired people in smart city using crowdsourcing

Panta, Y. R., Azam, S., Shanmugam, B., Yeo, K. C., Jonkman, M., De Boer, F. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 47-55 9 p. 8854533. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

disability
technology studies
Wheelchairs
open access
urban development

MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Shalaginov, A., Semeniuta, O. & Alazab, M., 2 Dec 2019, UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing. Association for Computing Machinery, Inc, p. 123-128 6 p. (UCC 2019 Companion - Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Learning systems
Neural networks
Controllers
Internet of things
Testing

Poster: A pluggable authentication module for big data federation architecture

Awaysheh, F. M., Cabaleiro, J. C., Pena, T. F. & Alazab, M., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), p. 223-225 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Authentication
Access control
Big data

Predicting likelihood of legitimate data loss in email DLP

Faiz, M. F., Arshad, J., Alazab, M. & Shalaginov, A., 11 Nov 2019, In : Future Generation Computer Systems. p. 1-14 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Loss prevention
Electronic mail
Decision trees
Telecommunication
Learning systems

Ransomware triage using deep learning: Twitter as a case study

Vinayakumar, V., Alazab, M., Jolfaei, A., Kp, S. & Poornachandran, P., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 67-73 7 p. 8854532. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

twitter
social media
learning
incident
social network

Robust Intelligent Malware Detection Using Deep Learning

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P. & Venkatraman, S., 18 Apr 2019, In : IEEE Access. 7, p. 46717-46738 22 p., 18616035 .

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Learning algorithms
Learning systems
Deep learning
Malware
Image processing

Securing smart vehicles from relay attacks using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., 30 Oct 2019, In : Journal of Supercomputing. p. 1-18 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Relay
Learning systems
Machine Learning
Attack
Driver

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model

Ullah, F., Wang, J., Jabbar, S., Al-Turjman, F. & Alazab, M., 25 Sep 2019, In : IEEE Access. 7, p. 141987-141999 13 p., 8848478.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Learning algorithms
Computer programming languages
Feature extraction
Chemical activation
Sampling

Toward Detection of Child Exploitation Material: A Forensic Approach

Islam, M., Watters, P., Mahmood, A. & Alazab, M., 2019, Deep Learning Applications for Cyber Security. Alazab, M. & Tang, M. (eds.). Springer, p. 221-246 26 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Internet
Law enforcement
Face recognition
Luminance
Skin

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data

Ebenuwa, S. H., Sharif, M. S., Alazab, M. & Al-Nemrat, A., 25 Feb 2019, In : IEEE Access. 7, p. 24649-24666 18 p., 8651567.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Learning systems
Decision trees
Learning algorithms
Medicine
Support vector machines

Vulnerabilities analysis and security assessment framework for the internet of things

Shokeen, R., Shanmugam, B., Kannoorpatti, K., Azam, S., Jonkman, M. & Alazab, M., 1 May 2019, Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 22-29 8 p. 8854555. (Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

vulnerability
Internet
International Sociological Association
Internet of things
interconnection
2018

A Model Based Approach for the Extraction of Network Forensic Artifacts

Alsmadi, I. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 16-18 3 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Packet networks
Switches
Digital forensics
Data storage equipment
Customization

Classification of Malware Using Visualisation of Similarity Matrices

Venkatraman, S. & Alazab, M., 9 Jan 2018, Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. Al-Nemrat, A. & Alazab, M. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 3-8 6 p. (Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017; vol. 2018-September).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Visualization
Malware
Software
Explosions
Big data

Disclosure of cyber security vulnerabilities: Time series modelling

Tang, M. J., Alazab, M., Luo, Y. & Donlon, M., 1 Jan 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 255-275 21 p.

Research output: Contribution to journalArticleResearchpeer-review

time series
Time series
vulnerability
Crime
Process control

Editorial

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 1 Jan 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorialResearchpeer-review

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., Dec 2018, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Proceedings. Yang, L. T., Wang, G. & Chen, J. (eds.). Springer-Verlag London Ltd., Vol. 11342. p. 304-313 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11342 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Learning systems
Machine Learning
Relay
Attack
Supervised learning

Special Issue on: Cybersecurity in the Connected World

Al-Nemrat, A., Alazab, M., Alqatawna, J. & Benzaid, C., 2018, In : International Journal of Electronic Security and Digital Forensics. 10, 3, p. 205-206 2 p.

Research output: Contribution to journalEditorialResearch

Open Access
54 Downloads (Pure)

Use of Data Visualisation for Zero-Day Malware Detection

Venkatraman, S. & Alazab, M., 2 Dec 2018, In : Security and Communication Networks. 2018, p. 1-14 14 p., 1728303.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Data visualization
Visualization
Malware
Security of data
Computer networks

Welcome Message from the CCC 2017 General Chairs

Al-Nemrat, A. & Alazab, M., 9 Jan 2018, In : Proceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017. 2018-September, p. vi-vi 1 p.

Research output: Contribution to journalEditorialResearchpeer-review

2017

Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies

Tang, M., Alazab, M. & Luo, Y., 5 Jul 2017, In : IEEE Transactions on Big Data. 5, 3, p. 317-329 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Risk management
Time series
Acoustic waves
Big data
Disclosure

The malware detection challenge of accuracy

Akour, M., Alsmadi, I. & Alazab, M., 23 Feb 2017, 2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016. Beirut, Lebanon: IEEE, Institute of Electrical and Electronics Engineers, 6 p. 07863750

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Application programming interfaces (API)
Websites
Availability
Data mining
Learning systems
2016

Exploiting vulnerability disclosures: Statistical framework and case study

Tang, M., Alazab, M. & Luo, Y., 18 Oct 2016, Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. Amman, Jordan: IEEE, Institute of Electrical and Electronics Engineers, p. 117-122 6 p. 16397865

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

vulnerability
Time series
time series
Risk management
Acoustic waves