Follow
Ammar Alazab
Ammar Alazab
Torrens university
No verified email - Homepage
Title
Cited by
Cited by
Year
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab
Cybersecurity 4, 1-27, 2021
2812021
A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks
A Khraisat, Gondal, Vamplew, Kamruzzaman
Electronics 8 (11), 1210, 2019
2022019
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab
Electronics 9 (1), 173, 2020
1642020
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1642012
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012
1102012
Machine learning based botnet identification traffic
A Azab, M Alazab, M Aiash
2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016
1072016
Artificial intelligence for securing industrial-based cyber–physical systems
Z Lv, D Chen, R Lou, A Alazab
Future generation computer systems 117, 291-298, 2021
1062021
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
Benchmarking: an international journal 20 (4), 512-536, 2013
882013
Mining malware to detect variants
A Azab, R Layton, M Alazab, J Oliver
2014 fifth cybercrime and trustworthy computing conference, 44-53, 2014
722014
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0
MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ...
IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022
542022
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
3rd International conference on information and financial engineering IPEDR …, 2011
532011
Using response action with intelligent intrusion detection and prevention system against web application malware
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab
Information Management & Computer Security 22 (5), 431-449, 2014
412014
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks, 2022
382022
Information security governance: the art of detecting hidden malware
M Alazab, S Venkatraman, P Watters, M Alazab
IT security governance innovations: theory and research, 293-315, 2013
382013
Msic: malware spectrogram image classification
A Azab, M Khasawneh
IEEE Access 8, 102007-102021, 2020
322020
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
Proceedings of the 7th international conference on information technology …, 2011
292011
Characterising network traffic for skype forensics
A Azab, P Watters, R Layton
2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012
262012
Six Sigma approach to improve quality in e-services: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012
262012
Detection of obfuscated malicious JavaScript code
A Alazab, A Khraisat, M Alazab, S Singh
Future Internet 14 (8), 217, 2022
242022
Maximising competitive advantage on E-business websites: A data mining approach
A Alazab, S Bevinakoppa, A Khraisat
2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20