Follow
Muna  Al-Hawawreh
Muna Al-Hawawreh
Lecturer (Assistant Professor)-Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Identification of malicious activities in industrial internet of things based on deep learning models
M Al-hawawreh, N Moustafa, E Sitnikova
Journal of Information Security and Applications, 2018
3512018
X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things
M Al-Hawawreh, E Sitnikova, N Aboutorab
IEEE Internet of Things Journal 9 (5), 3962-3977, 2021
1052021
Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things
M Al-Hawawreh, F Den Hartog, E Sitnikova
IEEE Internet of Things Journal 6 (4), 7137-7151, 2019
792019
An anomaly-based approach for DDoS attack detection in cloud environment
A Rawashdeh, M Alkasassbeh, M Al-Hawawreh
International Journal of Computer Applications in Technology 57 (4), 312-324, 2018
622018
Leveraging deep learning models for ransomware detection in the industrial internet of things environment
M Al-Hawawreh, E Sitnikova
2019 military communications and information systems conference (MilCIS), 1-6, 2019
472019
Deep learning-enabled threat intelligence scheme in the internet of things networks
M Al-Hawawreh, N Moustafa, S Garg, MS Hossain
IEEE Transactions on Network Science and Engineering 8 (4), 2968-2981, 2020
442020
Developing a security testbed for industrial internet of things
M Al-Hawawreh, E Sitnikova
IEEE Internet of Things Journal 8 (7), 5558-5573, 2020
392020
An efficient intrusion detection model for edge system in brownfield industrial internet of things
M Al-Hawawreh, E Sitnikova, F Den Hartog
Proceedings of the 3rd international conference on big data and internet of …, 2019
342019
Industrial Internet of Things based ransomware detection using stacked variational neural network
M Al-Hawawreh, E Sitnikova
Proceedings of the 3rd international conference on big data and internet of …, 2019
342019
Chatgpt for cybersecurity: practical applications, challenges, and future directions
M Al-Hawawreh, A Aljuhani, Y Jararweh
Cluster Computing 26 (6), 3421-3436, 2023
312023
Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial IoT
M Al-Hawawreh, E Sitnikova, N Aboutorab
IEEE Access 9, 148738-148755, 2021
272021
A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning
M Al-Hawawreh, MS Hossain
Information Fusion 99, 101889, 2023
222023
Generative ai for cyber threat-hunting in 6g-enabled iot networks
MA Ferrag, M Debbah, M Al-Hawawreh
2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet …, 2023
192023
SYN flood attack detection in cloud environment based on TCP/IP header statistical features
MS Al-Hawawreh
2017 8th international conference on information technology (ICIT), 236-243, 2017
192017
Performance analysis of a WIMAX network in different propagation models
MS AL-Hawawreh, AI Zreikat
Int. J. Comput. Sci. Inf. Secur 15 (1), 2017
152017
A threat intelligence framework for protecting smart satellite-based healthcare networks
M Al-Hawawreh, N Moustafa, J Slay
Neural Computing and Applications 36 (1), 15-35, 2024
112024
An Efficient Approach for Representing and Sending Data in Wireless Sensor Networks.
M Hammad, M Bsoul, M Hammad, M Al-Hawawreh
J. Commun. 14 (2), 104-109, 2019
102019
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
M Al-Hawawreh, M Alazab, MA Ferrag, MS Hossain
Journal of Network and Computer Applications, 103809, 2023
92023
An online model to minimize energy consumption of IoT sensors in smart cities
M Al-Hawawreh, I Elgendi, K Munasinghe
IEEE Sensors Journal 22 (20), 19524-19532, 2022
92022
Fake or genuine? contextualised text representation for fake review detection
R Mohawesh, S Xu, M Springer, M Al-Hawawreh, S Maqsood
arXiv preprint arXiv:2112.14343, 2021
92021
The system can't perform the operation now. Try again later.
Articles 1–20