A deep learning approach for proactive multi-cloud cooperative intrusion detection system A Abusitta, M Bellaiche, M Dagenais, T Halabi Future Generation Computer Systems 98, 308-318, 2019 | 129 | 2019 |
Malware classification and composition analysis: A survey of recent developments A Abusitta, MQ Li, BCM Fung Journal of Information Security and Applications 59, 102828, 2021 | 78 | 2021 |
Deep learning-enabled anomaly detection for IoT systems A Abusitta, GHS de Carvalho, OA Wahab, T Halabi, BCM Fung, ... Internet of Things 21, 100656, 2023 | 60 | 2023 |
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment A Abusitta, M Bellaiche, M Dagenais Journal of Cloud Computing 7 (1), 1-18, 2018 | 45 | 2018 |
A visual cryptography based watermark technology for individual and group images A Sleit, A Abusitta Systemics, Cybernetics and Informatics 5 (2), 24-32, 2008 | 33 | 2008 |
Generative adversarial networks for mitigating biases in machine learning systems A Abusitta, E Aïmeur, O Abdel Wahab ECAI 2020, 937-944, 2020 | 26 | 2020 |
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments A Abusitta, M Bellaiche, M Dagenais 2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018 | 25 | 2018 |
A visual cryptography based digital image copyright protection AH Abusitta Scientific Research Publishing, 2012 | 25 | 2012 |
Teens-online: A game theory-based collaborative platform for privacy education R Yusri, A Abusitta, E Aïmeur International Journal of Artificial Intelligence in Education 31, 726-768, 2021 | 20 | 2021 |
An efficient pattern matching algorithm A Sleit, W AlMobaideen, AH Baarah, AH Abusitta Journal of Applied Sciences 7 (18), 269-2695, 2007 | 19 | 2007 |
A cooperative game for online cloud federation formation based on security risk assessment T Halabi, M Bellaiche, A Abusitta 2018 5th IEEE International Conference on Cyber Security and Cloud Computing …, 2018 | 16 | 2018 |
Online allocation of cloud resources based on security satisfaction T Halabi, M Bellaiche, A Abusitta 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 14 | 2018 |
Bi-discriminator GAN for tabular data synthesis M Esmaeilpour, N Chaalia, A Abusitta, FX Devailly, W Maazoun, ... Pattern Recognition Letters 159, 204-210, 2022 | 13 | 2022 |
Multi-cloud cooperative intrusion detection system: trust and fairness assurance A Abusitta, M Bellaiche, M Dagenais Annals of Telecommunications 74, 637-653, 2019 | 12 | 2019 |
Toward secure resource allocation in mobile cloud computing: A matching game T Halabi, M Bellaiche, A Abusitta 2019 International Conference on Computing, Networking and Communications …, 2019 | 11 | 2019 |
Cloud security up for auction: a DSIC online mechanism for secure iaas resource allocation T Halabi, M Bellaiche, A Abusitta 2018 2nd Cyber Security in Networking Conference (CSNet), 1-8, 2018 | 9 | 2018 |
VirtualGAN: reducing mode collapse in generative adversarial networks using virtual mapping A Abusitta, OA Wahab, BCM Fung 2021 International joint conference on neural networks (IJCNN), 1-6, 2021 | 8 | 2021 |
A stable personalised partner selection for collaborative privacy education R Yusri, A Abusitta, E Aïmeur Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation …, 2020 | 6 | 2020 |
On the effectiveness of interpretable feedforward neural network MQ Li, BCM Fung, A Abusitta 2022 International Joint Conference on Neural Networks (IJCNN), 1-8, 2022 | 5 | 2022 |
12 Deep learning for proactive cooperative malware detection system A Abusitta, OA Wahab, T Halabi Edge Intelligence Workshop 711 (23), 7, 2020 | 5 | 2020 |