Follow
Ammar Alazab
Ammar Alazab
Torrens university
No verified email - Homepage
Title
Cited by
Cited by
Year
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab
Cybersecurity 4, 1-27, 2021
2892021
A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks
A Khraisat, Gondal, Vamplew, Kamruzzaman
Electronics 8 (11), 1210, 2019
2072019
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1672012
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab
Electronics 9 (1), 173, 2020
1662020
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012
1122012
Artificial intelligence for securing industrial-based cyber–physical systems
Z Lv, D Chen, R Lou, A Alazab
Future generation computer systems 117, 291-298, 2021
1102021
Machine learning based botnet identification traffic
A Azab, M Alazab, M Aiash
2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016
1072016
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
Benchmarking: an international journal 20 (4), 512-536, 2013
902013
Mining malware to detect variants
A Azab, R Layton, M Alazab, J Oliver
2014 fifth cybercrime and trustworthy computing conference, 44-53, 2014
722014
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0
MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ...
IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022
562022
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
3rd International conference on information and financial engineering IPEDR …, 2011
532011
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks, 2022
442022
Using response action with intelligent intrusion detection and prevention system against web application malware
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab
Information Management & Computer Security 22 (5), 431-449, 2014
442014
Information security governance: the art of detecting hidden malware
M Alazab, S Venkatraman, P Watters, M Alazab
IT security governance innovations: theory and research, 293-315, 2013
382013
Msic: malware spectrogram image classification
A Azab, M Khasawneh
IEEE Access 8, 102007-102021, 2020
332020
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
Proceedings of the 7th international conference on information technology …, 2011
292011
Characterising network traffic for skype forensics
A Azab, P Watters, R Layton
2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012
272012
Six Sigma approach to improve quality in e-services: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012
262012
Detection of obfuscated malicious JavaScript code
A Alazab, A Khraisat, M Alazab, S Singh
Future Internet 14 (8), 217, 2022
242022
Maximising competitive advantage on E-business websites: A data mining approach
A Alazab, S Bevinakoppa, A Khraisat
2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20