Deep learning approach for intelligent intrusion detection system R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ... Ieee Access 7, 41525-41550, 2019 | 1591 | 2019 |
Cybercrime classification and characteristics H Jahankhani, A Al-Nemrat, A Hosseinian-Far Cyber crime and cyber terrorism investigator's handbook, 149-164, 2014 | 124 | 2014 |
Variance ranking attributes selection techniques for binary classification problem in imbalance data SH Ebenuwa, MS Sharif, M Alazab, A Al-Nemrat IEEE access 7, 24649-24666, 2019 | 123 | 2019 |
Fast authentication in wireless sensor networks C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab Future Generation Computer Systems 55, 362-375, 2016 | 91 | 2016 |
Cyber crime and cyber terrorism investigator's handbook B Akhgar, A Staniforth, F Bosco Syngress, 2014 | 84 | 2014 |
A dynamic access control model using authorising workflow and task-role-based access control M Uddin, S Islam, A Al-Nemrat Ieee Access 7, 166676-166689, 2019 | 82 | 2019 |
Analysing Human Factors for an Effective Information Security Management System R Alavi, S Islam, H Jahankhani, A Al-Nemrat International Journal of Security Software Engineering (IJSSE), Special …, 2012 | 33 | 2012 |
An Analysis of Honeypot Programs and the Attack Data Collected C Moore, A Al-Nemrat Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 30 | 2015 |
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities N Sarantinos, C Benzaďd, O Arabiat, A Al-Nemrat 2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016 | 27 | 2016 |
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs F Amuchie, A Al-Nemrat, M Alazab, R Layton IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney …, 2012 | 25 | 2012 |
Sustainability in information systems auditing AABLA Rahman, A Al-Nemrat, DS Preston European Scientific Journal, 2014 | 22 | 2014 |
Examination of cyber-criminal behaviour H Jahankhani, A Al-Nemrat International Journal of Information Science and Management (IJISM), 41-48, 2012 | 22 | 2012 |
Intelligent detection of MAC spoofing attack in 802.11 network C Benzaďd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 19 | 2016 |
ARP Cache Poisoning Mitigation and Forensics Investigation AH Mangut, A Al-Nemrat, A Benzaid, Chafika, Tawil The 14th IEEE International Conference on Trust, Security and Privacy in …, 2015 | 19 | 2015 |
Cybercrime profiling and trend analysis H Jahankhani, A Al-Nemrat Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism …, 2011 | 17 | 2011 |
Cybercrime Victimisations/Criminalisation and Punishment A Al-Nemrat, H Jahankhani, DS Preston Global Security, Safety, and Sustainability 92 (1), 55-62, 2010 | 17 | 2010 |
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation EI Edem, C Benzaďd, A Al-Nemrat, P Watters 2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014 | 16 | 2014 |
Securing Address Registration in Location/ID Split Protocol using ID-Based Cryptography M Aiash, A Al-Nemrat, D Preston The 11th International Conference on Wired/Wireless Internet Communications …, 2013 | 15* | 2013 |
Sufficiency of windows event log as evidence in digital forensics NM Ibrahim, A Al-Nemrat, H Jahankhani, R Bashroush International Conference on e-Democracy, 253-262, 2011 | 14 | 2011 |
Improved awareness on fake websites and detecting techniques H Jahankhani, T Jayaraveendran, W Kapuku-Bwabw International Conference on e-Democracy, 271-279, 2011 | 13 | 2011 |