Search Results - "Alani, Mohammed M."
-
1
XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning
Published in Sensors (Basel, Switzerland) (02-06-2023)“…IoT devices have grown in popularity in recent years. Statistics show that the number of online IoT devices exceeded 35 billion in 2022. This rapid growth in…”
Get full text
Journal Article -
2
Towards an Explainable Universal Feature Set for IoT Intrusion Detection
Published in Sensors (Basel, Switzerland) (29-07-2022)“…As IoT devices’ adoption grows rapidly, security plays an important role in our daily lives. As part of the effort to counter these security threats in recent…”
Get full text
Journal Article -
3
PAIRED: An Explainable Lightweight Android Malware Detection System
Published in IEEE access (2022)“…With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android…”
Get full text
Journal Article -
4
PhishNot: A Cloud-Based Machine-Learning Approach to Phishing URL Detection
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-12-2022)“…Phishing is constantly growing to be one of the most adopted tools for conducting cyber-attacks. Recent statistics indicated that 97% of users could not…”
Get full text
Journal Article -
5
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems
Published in Computer networks (Amsterdam, Netherlands : 1999) (11-02-2022)“…Rapid urbanization is putting a strain on the transport systems of cities worldwide. The effects of this trend include prolonged traffic jams and increasing…”
Get full text
Journal Article -
6
AdStop: Efficient flow-based mobile adware detection using machine learning
Published in Computers & security (01-06-2022)“…In recent years, mobile devices have become commonly used not only for voice communications but also to play a major role in our daily activities. Accordingly,…”
Get full text
Journal Article -
7
An Intelligent Two-Layer Intrusion Detection System for the Internet of Things
Published in IEEE transactions on industrial informatics (01-01-2023)“…The Internet of Things (IoT) has become an enabler paradigm for different applications, such as healthcare, education, agriculture, smart homes, and recently,…”
Get full text
Journal Article -
8
DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT
Published in 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW) (01-07-2022)“…IoT adoption is becoming widespread in different areas of applications in our daily lives. The increased reliance on IoT devices has made them a worthy target…”
Get full text
Conference Proceeding -
9
A systematic review on the status and progress of homomorphic encryption technologies
Published in Journal of information security and applications (01-10-2019)“…With the emergence of big data and the continued growth in cloud computing applications, serious security and privacy concerns emerged. Consequently, several…”
Get full text
Journal Article -
10
Big data in cybersecurity: a survey of applications and future trends
Published in Journal of reliable intelligent environments (01-06-2021)“…With over 4.57 billion people using the Internet in 2020, the amount of data being generated has exceeded 2.5 quintillion bytes per day. This rapid increase in…”
Get full text
Journal Article -
11
Cybersecurity design considerations for cross-boundary clinical decision support
Published in Journal of reliable intelligent environments (01-07-2019)“…The idea of cross-boundary clinical decision support has the potential to transform the design of open data and decision support platforms through a connected…”
Get full text
Journal Article -
12
Special issue on security, usability and sustainability of smart cities
Published in Journal of reliable intelligent environments (01-03-2020)Get full text
Journal Article -
13
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning
Published in Computer communications (01-09-2022)“…The rapid increase in the adoption of the Internet of Things has increased the attack surface of these devices, encouraging malicious actors to target these…”
Get full text
Journal Article -
14
An explainable efficient flow-based Industrial IoT intrusion detection system
Published in Computers & electrical engineering (01-05-2023)“…With the steady growth in the adoption of IoT in an industrial context, security challenges intensify. Security threats to IoT devices in a nuclear plant or an…”
Get full text
Journal Article -
15
Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things
“…As new applications of the Internet of Things emerge in the health and medical services, malicious actors target these applications increasingly. These growing…”
Get full text
Conference Proceeding -
16
HoneyTwin: Securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots
Published in Journal of parallel and distributed computing (01-06-2024)“…With the promise of higher throughput, and better response times, 6G networks provide a significant enabler for smart cities to evolve. The rapidly-growing…”
Get full text
Journal Article -
17
On Recent Security Issues in Machine Learning
Published in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (17-09-2020)“…In recent years, applications of machine learning have grown rapidly in various areas. With the accelerating rate of data generation, and recent developments…”
Get full text
Conference Proceeding -
18
MANET security: A survey
Published in 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014) (01-11-2014)“…Mobile Ad hoc Networks are being adopted in more and more applications in our daily life. Mobile computing and mobile ad hoc networks in particular have become…”
Get full text
Conference Proceeding -
19
XMal: A lightweight memory-based explainable obfuscated-malware detector
Published in Computers & security (01-10-2023)Get full text
Journal Article -
20
A two-stage cyber attack detection and classification system for smart grids
Published in Internet of things (Amsterdam. Online) (01-12-2023)Get full text
Journal Article