A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks A Khraisat, Gondal, Vamplew, Kamruzzaman Electronics 8 (11), 1210, 2019 | 520* | 2019 |
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab Electronics 9 (1), 173, 2020 | 172 | 2020 |
Using feature selection for intrusion detection system A Alazab, M Hobbs, J Abawajy, M Alazab 2012 international symposium on communications and information technologies …, 2012 | 171 | 2012 |
Artificial intelligence for securing industrial-based cyber–physical systems Z Lv, D Chen, R Lou, A Alazab Future generation computer systems 117, 291-298, 2021 | 115 | 2021 |
Cybercrime: the case of obfuscated malware M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012 | 115 | 2012 |
Machine learning based botnet identification traffic A Azab, M Alazab, M Aiash 2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016 | 107 | 2016 |
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab Benchmarking: an international journal 20 (4), 512-536, 2013 | 92 | 2013 |
Mining malware to detect variants A Azab, R Layton, M Alazab, J Oliver 2014 fifth cybercrime and trustworthy computing conference, 44-53, 2014 | 73 | 2014 |
Network traffic classification: Techniques, datasets, and challenges A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour Digital Communications and Networks, 2022 | 62 | 2022 |
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0 MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ... IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022 | 58 | 2022 |
An optimal transportation routing approach using GIS-based dynamic traffic flows A Alazab, S Venkatraman, J Abawajy, M Alazab 3rd International conference on information and financial engineering IPEDR …, 2011 | 52 | 2011 |
Using response action with intelligent intrusion detection and prevention system against web application malware A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab Information Management & Computer Security 22 (5), 431-449, 2014 | 45 | 2014 |
Information security governance: the art of detecting hidden malware M Alazab, S Venkatraman, P Watters, M Alazab IT security governance innovations: theory and research, 293-315, 2013 | 38 | 2013 |
Msic: malware spectrogram image classification A Azab, M Khasawneh IEEE Access 8, 102007-102021, 2020 | 36 | 2020 |
Web application protection against SQL injection attack A Alazab, M Alazab, J Abawajy, M Hobbs Proceedings of the 7th international conference on information technology …, 2011 | 29 | 2011 |
Characterising network traffic for skype forensics A Azab, P Watters, R Layton 2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012 | 28 | 2012 |
Six Sigma approach to improve quality in e-services: An empirical study in Jordan S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012 | 27 | 2012 |
Maximising competitive advantage on E-business websites: A data mining approach A Alazab, S Bevinakoppa, A Khraisat 2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018 | 26 | 2018 |
Detection of obfuscated malicious JavaScript code A Alazab, A Khraisat, M Alazab, S Singh Future Internet 14 (8), 217, 2022 | 25 | 2022 |
New strategy for mitigating of SQL injection attack A Alazab, A Khresiat International Journal of Computer Applications 154 (11), 2016 | 24 | 2016 |