Wireless anomaly detection based on IEEE 802.11 behavior analysis H Alipour, YB Al-Nashif, P Satam, S Hariri IEEE transactions on information forensics and security 10 (10), 2158-2170, 2015 | 99 | 2015 |
Artificial neural networks-based intrusion detection system for internet of things fog nodes J Pacheco, VH Benitez, LC Felix-Herran, P Satam IEEE Access 8, 73907-73918, 2020 | 65 | 2020 |
WIDS: An anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol P Satam, S Hariri IEEE Transactions on Network and Service Management 18 (1), 1077-1091, 2020 | 55 | 2020 |
An explainable and efficient deep learning framework for video anomaly detection C Wu, S Shao, C Tunc, P Satam, S Hariri Cluster computing, 1-23, 2022 | 48 | 2022 |
Anomaly Behavior Analysis of DNS Protocol. P Satam, HR Alipour, YB Al-Nashif, S Hariri J. Internet Serv. Inf. Secur. 5 (4), 85-97, 2015 | 38 | 2015 |
Teaching and training cybersecurity as a cloud service C Tunc, S Hariri, FDLP Montero, F Fargo, P Satam, Y Al-Nashif 2015 International Conference on Cloud and Autonomic Computing, 302-308, 2015 | 23 | 2015 |
Bluetooth intrusion detection system (BIDS) P Satam, S Satam, S Hariri 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 21 | 2018 |
Real-time irc threat detection framework S Shao, C Tunc, P Satam, S Hariri 2017 IEEE 2nd International Workshops on Foundations and Applications of …, 2017 | 19 | 2017 |
Dns-ids: Securing dns in the cloud era P Satam, H Alipour, Y Al-Nashif, S Hariri 2015 International Conference on Cloud and Autonomic Computing, 296-301, 2015 | 18 | 2015 |
Anomaly behavior analysis of website vulnerability and security P Satam, D Kelly, S Hariri 2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016 | 13 | 2016 |
Dddas-based resilient cyber battle management services (d-rcbms) S Hariri, C Tunc, P Satam, F Al-Moualem, E Blasch Proceedings of the 2015 IEEE 22nd International Conference on High …, 2015 | 12 | 2015 |
Opportunities and challenges of disruptive innovation in medicine using artificial intelligence R Skaria, P Satam, Z Khalpey The American Journal of Medicine 133 (6), e215-e217, 2020 | 11 | 2020 |
AI-based Arabic Language and Speech Tutor S Shao, S Alharir, S Hariri, P Satam, S Shiri, A Mbarki 2022 IEEE/ACS 19th International Conference on Computer Systems and …, 2022 | 10 | 2022 |
Selecting post-processing schemes for accurate detection of small objects in low-resolution wide-area aerial imagery X Gao, S Ram, RC Philip, JJ Rodríguez, J Szep, S Shao, P Satam, ... Remote Sensing 14 (2), 255, 2022 | 10 | 2022 |
Multi-level bluetooth intrusion detection system S Satam, P Satam, S Hariri 2020 IEEE/ACS 17th International Conference on Computer Systems and …, 2020 | 10 | 2020 |
Autoinfotainment security development framework (ASDF) for smart cars P Satam, J Pacheco, S Hariri, M Horani 2017 International Conference on Cloud and Autonomic Computing (ICCAC), 153-159, 2017 | 10 | 2017 |
SDR-based resilient wireless communications F Almoualem, P Satam, JG Ki, S Hariri 2017 International Conference on Cloud and Autonomic Computing (ICCAC), 114-119, 2017 | 9 | 2017 |
CLaaS: Cybersecurity Lab as a Service--design, analysis, and evaluation C Tunc, S Hariri, FDLP Montero, F Fargo, P Satam 2015 International Conference on Cloud and Autonomic Computing, 224-227, 2015 | 9 | 2015 |
An anomaly behavior analysis intrusion detection system for wireless networks P Satam The University of Arizona, 2015 | 9 | 2015 |
Multi-layer mapping of cyberspace for intrusion detection S Shao, P Satam, S Satam, K Al-Awady, G Ditzler, S Hariri, C Tunc 2021 IEEE/ACS 18th International Conference on Computer Systems and …, 2021 | 8 | 2021 |