关注
Moutaz Alazab
标题
引用次数
引用次数
年份
COVID-19 Prediction and Detection Using Deep Learning
M Alazab, A Awajan, A Mesleh, A Abraham, V Jatana, S Alhyari
International Journal of Computer Information Systems and Industrial …, 2020
3042020
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
M Alazab, S Venkatraman, PA Watters, M Alazab
AusDM 11, 171-182, 2011
2902011
Intelligent mobile malware detection using permission requests and API calls
M Alazab, M Alazab, A Shalaginov, A Mesleh, A Awajan
Future Generation Computer Systems 107, 509-521, 2020
2232020
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance
M Alazab, S Alhyari, A Awajan, AB Abdallah
Cluster Computing 24 (1), 83-101, 2021
1942021
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1712012
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012
1142012
Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
Benchmarking: an international journal 20 (4), 512-536, 2013
922013
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
742012
Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0
MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ...
IEEE Transactions on Industrial Informatics 18 (12), 9153-9161, 2022
572022
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
572015
Trade-off among lean, agile, resilient and green paradigms: an empirical study on pharmaceutical industry in Jordan using a TOPSIS-entropy method
T Suifan, M Alazab, S Alhyari
International Journal of Advanced Operations Management 11 (1-2), 69-101, 2019
542019
Automated malware detection in mobile app stores based on robust feature generation
M Alazab
Electronics 9 (3), 435, 2020
482020
Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
O Alzubi, J Alzubi, M Alazab, A Alrabea, A Awajan, I Qiqieh
MDPI-Electronics, 2022
472022
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
412012
A new intrusion detection system based on Moth–Flame Optimizer algorithm
M Alazab, RA Khurma, A Awajan, D Camacho
Expert Systems with Applications 210, 118439, 2022
382022
Information security governance: the art of detecting hidden malware
M Alazab, S Venkatraman, P Watters, M Alazab
IT security governance innovations: theory and research, 293-315, 2013
382013
Augmented reality-based English language learning: importance and state of the art
M Wedyan, J Falah, O Elshaweesh, SFM Alfalah, M Alazab
Electronics 11 (17), 2692, 2022
322022
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
Proceedings of the 7th international conference on information technology …, 2011
292011
Six Sigma approach to improve quality in e-services: An empirical study in Jordan
S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
International Journal of Electronic Government Research (IJEGR) 8 (2), 57-74, 2012
272012
Detection of obfuscated malicious JavaScript code
A Alazab, A Khraisat, M Alazab, S Singh
Future Internet 14 (8), 217, 2022
242022
系统目前无法执行此操作,请稍后再试。
文章 1–20