Search Results - "Alazab, Mamoun"

Refine Results
  1. 1

    Profiling and classifying the behavior of malicious codes by Alazab, Mamoun

    Published in The Journal of systems and software (01-02-2015)
    “…Malware is a major security threat confronting computer systems and networks and has increased in scale and impact from the early days of ICT. Traditional…”
    Get full text
    Journal Article
  2. 2

    Image-Based malware classification using ensemble of CNN architectures (IMCEC) by Vasan, Danish, Alazab, Mamoun, Wassan, Sobia, Safaei, Babak, Zheng, Qin

    Published in Computers & security (01-05-2020)
    “…Both researchers and malware authors have demonstrated that malware scanners are unfortunately limited and are easily evaded by simple obfuscation techniques…”
    Get full text
    Journal Article
  3. 3

    PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare by Sun, Yi, Liu, Jie, Yu, Keping, Alazab, Mamoun, Lin, Kaixiang

    “…In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of…”
    Get full text
    Journal Article
  4. 4

    Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices by Wang, Weizheng, Xu, Hao, Alazab, Mamoun, Gadekallu, Thippa Reddy, Han, Zhaoyang, Su, Chunhua

    “…Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which…”
    Get full text
    Journal Article
  5. 5

    Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System by Yu, Keping, Lin, Long, Alazab, Mamoun, Tan, Liang, Gu, Bo

    “…It is expected that a mixture of autonomous and manual vehicles will persist as a part of the intelligent transportation system (ITS) for many decades. Thus,…”
    Get full text
    Journal Article
  6. 6

    Blockchain for Industry 4.0: A Comprehensive Review by Bodkhe, Umesh, Tanwar, Sudeep, Parekh, Karan, Khanpara, Pimal, Tyagi, Sudhanshu, Kumar, Neeraj, Alazab, Mamoun

    Published in IEEE access (2020)
    “…Due to the proliferation of ICT during the last few decades, there is an exponential increase in the usage of various smart applications such as smart farming,…”
    Get full text
    Journal Article
  7. 7

    Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment by Bera, Basudeb, Saha, Sourav, Das, Ashok Kumar, Kumar, Neeraj, Lorenz, Pascal, Alazab, Mamoun

    Published in IEEE transactions on vehicular technology (01-08-2020)
    “…The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during…”
    Get full text
    Journal Article
  8. 8

    Deep Learning Approach for Intelligent Intrusion Detection System by Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, Ameer, Venkatraman, Sitalakshmi

    Published in IEEE access (2019)
    “…Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the…”
    Get full text
    Journal Article
  9. 9

    The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems by Iwendi, Celestine, Khan, Suleman, Anajemba, Joseph Henry, Mittal, Mohit, Alenezi, Mamdouh, Alazab, Mamoun

    Published in Sensors (Basel, Switzerland) (30-04-2020)
    “…The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides…”
    Get full text
    Journal Article
  10. 10

    A Comprehensive Survey for Intelligent Spam Email Detection by Karim, Asif, Azam, Sami, Shanmugam, Bharanidharan, Kannoorpatti, Krishnan, Alazab, Mamoun

    Published in IEEE access (2019)
    “…The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable…”
    Get full text
    Journal Article
  11. 11

    Robust Intelligent Malware Detection Using Deep Learning by Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Venkatraman, Sitalakshmi

    Published in IEEE access (2019)
    “…Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer…”
    Get full text
    Journal Article
  12. 12

    Hand gesture classification using a novel CNN-crow search algorithm by Gadekallu, Thippa Reddy, Alazab, Mamoun, Kaluri, Rajesh, Maddikunta, Praveen Kumar Reddy, Bhattacharya, Sweta, Lakshmanna, Kuruva, M, Parimala

    Published in Complex & intelligent systems (01-08-2021)
    “…Human–computer interaction (HCI) and related technologies focus on the implementation of interactive computational systems. The studies in HCI emphasize on…”
    Get full text
    Journal Article
  13. 13

    Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions by Chengoden, Rajeswari, Victor, Nancy, Huynh-The, Thien, Yenduri, Gokul, Jhaveri, Rutvij H., Alazab, Mamoun, Bhattacharya, Sweta, Hegde, Pawan, Maddikunta, Praveen Kumar Reddy, Gadekallu, Thippa Reddy

    Published in IEEE access (2023)
    “…The rapid progress in digitalization and automation have led to an accelerated growth in healthcare, generating novel models that are creating new channels for…”
    Get full text
    Journal Article
  14. 14

    Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey by Bhattacharya, Sweta, Reddy Maddikunta, Praveen Kumar, Pham, Quoc-Viet, Gadekallu, Thippa Reddy, Krishnan S, Siva Rama, Chowdhary, Chiranji Lal, Alazab, Mamoun, Jalil Piran, Md

    Published in Sustainable cities and society (01-02-2021)
    “…Since December 2019, the coronavirus disease (COVID-19) outbreak has caused many death cases and affected all sectors of human life. With gradual progression…”
    Get full text
    Journal Article
  15. 15

    A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing by Zhang, Hongli, Jolfaei, Alireza, Alazab, Mamoun

    Published in IEEE access (2019)
    “…To avoid the complex process of explicit feature extraction in traditional facial expression recognition, a face expression recognition method based on a…”
    Get full text
    Journal Article
  16. 16

    Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies by Tang, MingJian, Alazab, Mamoun, Luo, Yuxiu

    Published in IEEE transactions on big data (01-09-2019)
    “…Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised…”
    Get full text
    Journal Article
  17. 17

    FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems by Arikumar, K S, Prathiba, Sahaya Beni, Alazab, Mamoun, Gadekallu, Thippa Reddy, Pandya, Sharnil, Khan, Javed Masood, Moorthy, Rajalakshmi Shenbaga

    Published in Sensors (Basel, Switzerland) (11-02-2022)
    “…Recent technological developments, such as the Internet of Things (IoT), artificial intelligence, edge, and cloud computing, have paved the way in transforming…”
    Get full text
    Journal Article
  18. 18

    Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things by Gu, Bo, Zhang, Xu, Lin, Ziqi, Alazab, Mamoun

    Published in IEEE internet of things journal (01-03-2021)
    “…Ultrareliable and low-latency communication (URLLC) is a prerequisite for the successful implementation of the Internet of Controllable Things. In this…”
    Get full text
    Journal Article
  19. 19

    MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning by Vasan, Danish, Alazab, Mamoun, Venkatraman, Sitalakshmi, Akram, Junaid, Qin, Zheng

    Published in IEEE transactions on computers (01-11-2020)
    “…The complexity, sophistication, and impact of malware evolve with industrial revolution and technology advancements. This article discusses and proposes a…”
    Get full text
    Journal Article
  20. 20

    Securing smart vehicles from relay attacks using machine learning by Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza

    Published in The Journal of supercomputing (01-04-2020)
    “…Due to the rapid developments in intelligent transportation systems, modern vehicles have turned into intelligent transportation means which are able to…”
    Get full text
    Journal Article