Leveraging machine learning techniques for windows ransomware network traffic detection OMK Alhawi, J Baldwin, A Dehghantanha Cyber Threat Intelligence, 93-106, 2018 | 215 | 2018 |
Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies J Baldwin, OMK Alhawi, S Shaughnessy, A Akinbi, A Dehghantanha Cyber Threat Intelligence, 311-331, 2018 | 33 | 2018 |
Verification and Refutation of C Programs based on k-Induction and Invariant Inference OM Alhawi, H Rocha, MR Gadelha, L Cordeiro, E Batista The International Journal on Software Tools for Technology Transfer (STTT), 2020 | 16 | 2020 |
Finding security vulnerabilities in unmanned aerial vehicles using software verification OM Alhawi, MA Mustafa, LC Cordiro 2019 International Workshop on Secure Internet of Things (SIOT), 1-9, 2019 | 15 | 2019 |
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications OMK Alhawi, A Akinbi, A Dehghantanha Handbook of Big Data and IoT Security 426, 2019 | 11 | 2019 |
Finding Software Vulnerabilities in Unmanned Aerial Vehicles OMK Alhawi University of Manchester, 2021 | 2 | 2021 |
TECHNOLOGY ENHANCED APPROACH TO TEACHING AND LEARNING MATHEMATICS USING DYNAMIC WEBSITES O Alhawi ICERI 2011, 4th International Conference of Education, Research and Innovation., 2011 | | 2011 |
READINESS-BASED INTERVENTION STRATEGIES FOR AN E-LEARNING ENVIRONMENT OF THE ALAQSA UNIVERSITY GRADUATE PROGRAM O Alhawi ICERI 2011, 4th International Conference of Education, Research and Innovation., 2011 | | 2011 |
SIoT 2019 J Groszschaedl, OM Alhawi, MA Mustafa, LC Cordeiro, FA Stancu, ... | | |