Raw network traffic data preprocessing and preparation for automatic analysis B Alothman 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 16 | 2019 |
Android botnet detection: An integrated source code mining approach B Alothman, P Rattadilok 2017 12th International Conference for Internet Technology and Secured …, 2017 | 16 | 2017 |
Towards using transfer learning for botnet detection B Alothman, P Rattadilok 2017 12th International Conference for Internet Technology and Secured …, 2017 | 14 | 2017 |
Similarity-Based Instance Transfer Learning for Botnet Detection B Alothman International Journal of Intelligent Computing Research (IJICR) 9 (1), 880-889, 2018 | 13 | 2018 |
A transfer reinforcement learning framework for smart home energy management systems M Khan, BN Silva, O Khattab, B Alothman, C Joumaa IEEE Sensors Journal 23 (4), 4060-4068, 2022 | 8 | 2022 |
Developing a cyber incident exercises model to educate security teams B Alothman, A Alhajraf, R Alajmi, RA Farraj, N Alshareef, M Khan Electronics 11 (10), 1575, 2022 | 5 | 2022 |
Class balanced similarity-based instance transfer learning for botnet family classification B Alothman, H Janicke, SY Yerima Discovery Science: 21st International Conference, DS 2018, Limassol, Cyprus …, 2018 | 5 | 2018 |
A fuzzy logic-based stabilization system for a flying robot, with an embedded energy harvester and a visual decision-making system A Baba, B Alothman Robotics and Autonomous Systems 167, 104471, 2023 | 4 | 2023 |
A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home Environment K Al-Begain, M Khan, B Alothman, C Joumaa, E Alrashed Applied Sciences 12 (22), 11853, 2022 | 4 | 2022 |
Designing a vertical handover algorithm for security-constrained applications O Khattab, M Khan, B Alothman Applied Sciences 13 (4), 2166, 2023 | 3 | 2023 |
Development of an Electronic Smart Safe Box Using Private Blockchain Technology B Alothman, C Joumaa, A Alotaibi, B Alotaibi, B Almutairi, A Aldhafairi, ... Applied Sciences 12 (13), 6445, 2022 | 3 | 2022 |
Towards Enhancing Cyber Security Awareness Using Gamification Escape Room B Alothman, K Al-Khulifa, R Al-Shammari, C Joumaa, M Khan 2023 Fourteenth International Conference on Ubiquitous and Future Networks …, 2023 | 2 | 2023 |
Accelerating university admission system using machine learning techniques B Alothman, H Alazmi, MB Ali, N Alqallaf, M Khan 2022 Thirteenth International Conference on Ubiquitous and Future Networks …, 2022 | 2 | 2022 |
Robust Botnet Detection Techniques for Mobile and Network Environments B Alothman De Montfort University, 2019 | 2 | 2019 |
The Development of a Secure Online System to Protect Social Networking Platforms from Security Attacks B Alothman, O Alibrahim, N Alenezi, A Alhashemi, M Alhashemi, ... Applied Sciences 13 (21), 11731, 2023 | | 2023 |
Securing Medical Records Using Private Blockchain Technology B Alothman, M Alenezi, D Alhamdan, M Almutairat, Z Almousa, C Joumaa, ... 2023 Fifth International Conference on Blockchain Computing and Applications …, 2023 | | 2023 |
Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks A Baba, B Alothman, O Khattab 2023 Fifth International Conference on Blockchain Computing and Applications …, 2023 | | 2023 |
Deep Transfer Learning-Enabled Energy Management Strategy for Smart Home Sensor Networks O Alibrahim, S Padmanaban, M Khan, O Khattab, B Alothman, C Joumaa IEEE Transactions on Industry Applications 59 (1), 81-92, 2022 | | 2022 |
AFramework TO PROTECT IOT DEVICES FROM ENSLAVEMENT IN A HOME ENVIRONMENT K Al-Begain, M Khan, B Alothman, C Joumaa, I Rashed CS & IT Conference Proceedings 12 (20), 2022 | | 2022 |
Developing a Cyber Incident Exercises Model to Educate Security Teams. Electronics 2022, 11, 1575 B Alothman, A Alhajraf, R Alajmi, RA Farraj, N Alshareef, M Khan s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2022 | | 2022 |