关注
Mohammed Hussain
Mohammed Hussain
College of Technological Innovation, Zayed University
在 zu.ac.ae 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A lightweight perceptron-based intrusion detection system for fog computing
B Sudqi Khater, AWB Abdul Wahab, MYIB Idris, M Abdulla Hussain, ...
applied sciences 9 (1), 178, 2019
1352019
SECaaS: security as a service for cloud-based applications
M Hussain, H Abdulsalam
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-4, 2011
772011
UMLintr: a UML profile for specifying intrusions
M Hussein, M Zulkernine
13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006
702006
The impact of cloud computing on ITIL service strategy processes
MB Al Mourad, M Hussain
International Journal of Computer and Communication Engineering 3 (5), 367, 2014
432014
Drone Forensics: A Detailed Analysis of Emerging DJI Models
M Yousef, F Iqbal, M Hussain
International conference on information and communication systems, 66-71, 2020
422020
Intrusion detection aware component-based systems: A specification-based framework
M Hussein, M Zulkernine
Journal of Systems and Software 80 (5), 700-710, 2007
392007
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
BS Khater, AWA Wahab, MYI Idris, M Hussain, AA Ibrahim, MA Amin, ...
Electronics 10 (14), 1633, 2021
382021
Digital wellbeing tools through users lens
MB Almourad, A Alrobai, T Skinner, M Hussain, R Ali
Technology in Society 67, 101778, 2021
322021
Mining Educational Data for Academic Accreditation: Aligning Assessment with Outcomes
M Hussain, M Al-Mourad, S Mathew, A Hussein
Global Journal of Flexible Systems Management 18 (1), 51–60, 2017
232017
Software quality in the clouds: a cloud-based solution
M Hussain, HM Abdulsalam
Cluster Computing 17, 389-402, 2014
232014
Effective third party auditing in cloud computing
M Hussain, MB Al-Mourad
2014 28th International Conference on Advanced Information Networking and …, 2014
192014
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
R Ali, A Ali, F Iqbal, M Hussain, F Ullah, A Michienzi
Security and Communication Networks 2022 (2959222), 2022
172022
Trust in Mobile Cloud Computing with LTE-based Deployment
M Hussain, B Almourad
IEEE Conference on Scalable Computing and Communications, 643-648, 2014
172014
Digital forensic acquisition and analysis of discord applications
M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem
2020 international conference on communications, computing, cybersecurity …, 2020
162020
The design and applications of a privacy-preserving identity and trust-management system
M Hussain
Canadian theses, 2010
162010
Analysis of WCAG 2.0 data accessibility success criterion of e-government websites
MB Almourad, M Hussain, F Kamoun, Z Wattar
Periodicals of Engineering and Natural Sciences 7 (1), 496-503, 2019
142019
Using deep learning to detect social media ‘trolls’
Á MacDermott, M Motylinski, F Iqbal, K Stamp, M Hussain, A Marrington
Forensic Science International: Digital Investigation 43, 301446, 2022
132022
Forensic analysis of the Cisco WebEx application
Z Khalid, F Iqbal, F Kamoun, M Hussain, LA Khan
2021 5th Cyber Security in Networking Conference (CSNet), 90-97, 2021
122021
Well-formed semantic model for co-Learning
J Alomari, M Hussain, S Turki, M Masud
Computers in Human Behavior, 2015
122015
Collect, Scope, and Verify Big Data – A Framework for Institution Accreditation
M Hussain, M Al-Mourad, S Mathew
Advanced Information Networking and Applications Workshops (WAINA), 2016 …, 2016
92016
系统目前无法执行此操作,请稍后再试。
文章 1–20