COVID-19 Prediction and Detection Using Deep Learning M Alazab, A Awajan, A Mesleh, A Abraham, V Jatana, S Alhyari International Journal of Computer Information Systems and Industrial …, 2020 | 304 | 2020 |
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. M Alazab, S Venkatraman, PA Watters, M Alazab AusDM 11, 171-182, 2011 | 290 | 2011 |
Intelligent mobile malware detection using permission requests and API calls M Alazab, M Alazab, A Shalaginov, A Mesleh, A Awajan Future Generation Computer Systems 107, 509-521, 2020 | 223 | 2020 |
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance M Alazab, S Alhyari, A Awajan, AB Abdallah Cluster Computing 24 (1), 83-101, 2021 | 194 | 2021 |
Using feature selection for intrusion detection system A Alazab, M Hobbs, J Abawajy, M Alazab 2012 international symposium on communications and information technologies …, 2012 | 171 | 2012 |
Cybercrime: the case of obfuscated malware M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012 | 114 | 2012 |
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab Benchmarking: an international journal 20 (4), 512-536, 2013 | 92 | 2013 |
Analysis of malicious and benign android applications M Alazab, V Moonsamy, L Batten, P Lantz, R Tian 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 74 | 2012 |
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0 MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ... IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022 | 57 | 2022 |
A brief review of new threats and countermeasures in digital crime and cyber terrorism M Dawson New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015 | 57 | 2015 |
Trade-off among lean, agile, resilient and green paradigms: an empirical study on pharmaceutical industry in Jordan using a TOPSIS-entropy method T Suifan, M Alazab, S Alhyari International Journal of Advanced Operations Management 11 (1-2), 69-101, 2019 | 54 | 2019 |
Automated malware detection in mobile app stores based on robust feature generation M Alazab Electronics 9 (3), 435, 2020 | 48 | 2020 |
Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment O Alzubi, J Alzubi, M Alazab, A Alrabea, A Awajan, I Qiqieh MDPI-Electronics, 2022 | 47 | 2022 |
Towards an understanding of the impact of advertising on data leaks V Moonsamy, M Alazab, L Batten International journal of security and networks 7 (3), 181-193, 2012 | 41 | 2012 |
A new intrusion detection system based on Moth–Flame Optimizer algorithm M Alazab, RA Khurma, A Awajan, D Camacho Expert Systems with Applications 210, 118439, 2022 | 38 | 2022 |
Information security governance: the art of detecting hidden malware M Alazab, S Venkatraman, P Watters, M Alazab IT security governance innovations: theory and research, 293-315, 2013 | 38 | 2013 |
Augmented reality-based English language learning: importance and state of the art M Wedyan, J Falah, O Elshaweesh, SFM Alfalah, M Alazab Electronics 11 (17), 2692, 2022 | 32 | 2022 |
Web application protection against SQL injection attack A Alazab, M Alazab, J Abawajy, M Hobbs Proceedings of the 7th international conference on information technology …, 2011 | 29 | 2011 |
Six Sigma approach to improve quality in e-services: An empirical study in Jordan S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012 | 27 | 2012 |
Detection of obfuscated malicious JavaScript code A Alazab, A Khraisat, M Alazab, S Singh Future Internet 14 (8), 217, 2022 | 24 | 2022 |