Ammar Alazab

Orcid: 0000-0001-9443-937X

According to our database1, Ammar Alazab authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Roadmap of Concept Drift Adaptation in Data Stream Mining, Years Later.
IEEE Access, 2024

2023
Smart Contract-Based Access Control Framework for Internet of Things Devices.
Comput., October, 2023

2022
Detection of Obfuscated Malicious JavaScript Code.
Future Internet, 2022

2021
Artificial intelligence for securing industrial-based cyber-physical systems.
Future Gener. Comput. Syst., 2021

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges.
Cybersecur., 2021

2019
Energy Efficient and Delay Aware 5G Multi-Tier Network.
Remote. Sens., 2019

Multi-factor based enhancing students' motivations.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

A Comprehensive Protection Method for Securing the Organization's Network Against Cyberattacks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Information Security: Definitions, Threats and Management in Dubai Hospitals Context.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Designing Security Intelligent Agent for Petrol Theft Prevention.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2014
Using response action with intelligent intrusion detection and prevention system against web application malware.
Inf. Manag. Comput. Secur., 2014

2013
Malware Detection and Prevention System Based on Multi-Stage Rules.
Int. J. Inf. Secur. Priv., 2013

Crime Toolkits: The Productisation of Cybercrime.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
Six Sigma Approach to Improve Quality in E-Services: An Empirical Study in Jordan.
Int. J. Electron. Gov. Res., 2012

Using feature selection for intrusion detection system.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2011
Cybercrime: The Case of Obfuscated Malware.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011


  Loading...