A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise U Noor, Z Anwar, T Amjad, KKR Choo Future Generation Computer Systems 96, 227-242, 2019 | 156 | 2019 |
A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories U Noor, Z Anwar, AW Malik, S Khan, S Saleem Future Generation Computer Systems 95, 467-487, 2019 | 60 | 2019 |
Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem Z Rashid, U Noor, J Altmann Future Generation Computer Systems 124, 436-466, 2021 | 41 | 2021 |
A survey of automatic deep web classification techniques U Noor, Z Rashid, A Rauf International Journal of Computer Applications 19 (6), 43-50, 2011 | 36 | 2011 |
Customer-oriented ranking of cyber threat intelligence service providers U Noor, Z Anwar, J Altmann, Z Rashid Electronic Commerce Research and Applications 41, 100976, 2020 | 15 | 2020 |
An association rule mining-based framework for profiling regularities in tactics techniques and procedures of cyber threat actors U Noor, Z Anwar, Z Rashid 2018 International Conference on Smart Computing and Electronic Enterprise …, 2018 | 14 | 2018 |
TrustBook: web of trust based relationship establishment in online social networks U Noor, Z Anwar, Y Mehmood, W Aslam 2013 11th International Conference on Frontiers of Information Technology …, 2013 | 8 | 2013 |
Latent dirichlet allocation based semantic clustering of heterogeneous deep web sources U Noor, A Daud, A Manzoor 2013 5th International Conference on Intelligent Networking and …, 2013 | 8 | 2013 |
Network externalities in cybersecurity information sharing ecosystems Z Rashid, U Noor, J Altmann Economics of Grids, Clouds, Systems, and Services: 15th International …, 2019 | 7 | 2019 |
Visualizing interesting patterns in cyber threat intelligence using machine learning techniques S Ejaz, U Noor, Z Rashid Cybernetics and Information Technologies 22 (2), 96-113, 2022 | 6 | 2022 |
TODWEB: Training-Less ontology based deep web source classification U Noor, Z Rashid, A Rauf Proceedings of the 13th International Conference on Information Integration …, 2011 | 4 | 2011 |
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic M Sadaf, Z Iqbal, Z Anwar, U Noor, M Imran, TR Gadekallu Vehicular Communications 46, 100741, 2024 | 3 | 2024 |
A survey revealing path towards service life cycle management in COBIT 5 U Noor, A Ghazanfar 2016 Eleventh International Conference on Digital Information Management …, 2016 | 3 | 2016 |
NFT-based blockchain-oriented security framework for metaverse applications K Manzoor, U Noor, Z Rashid arXiv preprint arXiv:2307.10342, 2023 | 2 | 2023 |
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks U Noor, S Shahid, R Kanwal, Z Rashid arXiv preprint arXiv:2307.10252, 2023 | 2 | 2023 |
Secure Semantic Web Application Development: Present and Future U Noor, Z Rashid 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016 | 1 | 2016 |
Enhancing Smart Cities Through Real-Time Insights and Safety: A Comparative Study of Supervised Machine Learning Algorithms for Anomaly Detection in Emerging Urban Landscapes U Noor, R Kanwal, Z Rashid Technical Journal 29 (01), 47-60, 2024 | | 2024 |
The Role of Machine Learning Techniques and Internet of Things Devices in COVID-19 Detection: A Mapping Study. T Rasool, S Javaid, U Noor, S Imtiaz, Z Rashid Technical Journal of University of Engineering & Technology Taxila 28 (4), 2023 | | 2023 |
A Hybrid Learning Approach for Automatic Data Labelling and Anomaly Detection in IoT Networks R Kanwal, U Noor, Z Rashid 2023 3rd International Conference on Artificial Intelligence (ICAI), 238-241, 2023 | | 2023 |