Qussai Yaseen

Orcid: 0000-0003-0777-1871

According to our database1, Qussai Yaseen authored at least 38 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models.
Inf., 2023

A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features.
IEEE Access, 2023

A Comparative Analysis of Machine Learning Algorithms for Android Malware Detection.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
A Context-Aware Android Malware Detection Approach Using Machine Learning.
Inf., 2022

Detecting Spam Email with Machine Learning Optimized with Harris Hawks optimizer (HHO) Algorithm.
Proceedings of the 13th International Conference on Ambient Systems, 2022

2021
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System.
J. Netw. Syst. Manag., 2021

ReDroidDet: Android Malware Detection Based on Recurrent Neural Network.
Proceedings of the 12th International Conference on Ambient Systems, 2021

Spam Email Detection Using Deep Learning Techniques.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
A knowledgebase insider threat mitigation model in the cloud: a proactive approach.
Int. J. Adv. Intell. Paradigms, 2020

Improving classification and clustering techniques using GPUs.
Concurr. Comput. Pract. Exp., 2020

Machine Learning for Traffic Analysis: A Review.
Proceedings of the 11th International Conference on Ambient Systems, 2020

2019
A blockchain model for preserving intellectual property.
Proceedings of the Second International Conference on Data Science, 2019

A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

A topology-based performance Evaluation for an adaptive tuning protocol for service and resource discovery in the Internet of Things.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
Collusion attacks mitigation in internet of things: a fog based model.
Multim. Tools Appl., 2018

Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2018

An Enhanced AODV Protocol for Avoiding Black Holes in MANET.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

2017
A scalable Map Reduce tasks scheduling: a threading-based approach.
Int. J. Comput. Sci. Eng., 2017

An insider threat aware access control for cloud relational databases.
Clust. Comput., 2017

2016
Mitigating insider threat in cloud relational databases.
Secur. Commun. Networks, 2016

Cloud support for large scale e-healthcare systems.
Ann. des Télécommunications, 2016

A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks.
Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016

Exploiting GPUs to accelerate clustering algorithms.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure.
Concurr. Comput. Pract. Exp., 2015

Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Extracting the roots of Arabic words without removing affixes.
J. Inf. Sci., 2014

2013
PEP-side caching: An insider threat port.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

2012
Insider threat mitigation: preventing unauthorized knowledge acquisition.
Int. J. Inf. Sec., 2012

Tackling Insider Threat in Cloud Relational Databases.
Proceedings of the IEEE Fifth International Conference on Utility and Cloud Computing, 2012

Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Malicious Users' Transactions: Tackling Insider Threat.
Proceedings of the Information Security and Privacy Research, 2012

Mitigating Insider Threat on Database Integrity.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Enhanced Insider Threat Detection Model that Increases Data Availability.
Proceedings of the Distributed Computing and Internet Technology, 2011

2010
A new enhancement to the R-tree node splitting.
J. Inf. Sci., 2010

Predicting and Preventing Insider Threat in Relational Database Systems.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...