Breast Cancer Detection Using K-Nearest Neighbor Machine Learning Algorithm A Alarabeyyat, M Alhanahnah Developments in eSystems Engineering (DeSE), 2016 9th International …, 2016 | 180 | 2016 |
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 94 | 2018 |
Scalable analysis of interaction threats in IoT systems M Alhanahnah, C Stevens, H Bagheri Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020 | 63 | 2020 |
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers M Alhanahnah, P Bertok, Z Tari, S Alouneh Future Generation Computer Systems 79, 488-499, 2018 | 49 | 2018 |
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors M Alhanahnah, P Bertok, Z Tari IEEE Cloud Computing 4 (1), 44-54, 2017 | 38 | 2017 |
Dina: Detecting hidden android inter-app communication in dynamic loaded code M Alhanahnah, Q Yan, H Bagheri, H Zhou, Y Tsutano, W Srisa-An, X Luo IEEE Transactions on Information Forensics and Security 15, 2782-2797, 2020 | 21 | 2020 |
Practical Data Access Minimization in {Trigger-Action} Platforms Y Chen, M Alhanahnah, A Sabelfeld, R Chatterjee, E Fernandes 31st USENIX Security Symposium (USENIX Security 22), 2929-2945, 2022 | 17 | 2022 |
A Multidimension Taxonomy of Insider Threats in Cloud Computing MJ Alhanahnah, A Jhumka, S Alouneh The Computer Journal, 2016 | 16 | 2016 |
Detecting vulnerable Android inter-app communication in dynamically loaded code M Alhanahnah, Q Yan, H Bagheri, H Zhou, Y Tsutano, W Srisa-An, X Luo IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 550-558, 2019 | 13 | 2019 |
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization M Alhanahnah, R Jain, V Rastogi, S Jha, T Reps 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 251-269, 2022 | 12 | 2022 |
IoTCom: Dissecting Interaction Threats in IoT Systems M Alhanahnah, C Stevens, B Chen, Q Yan, H Bagheri IEEE Transactions on Software Engineering 49 (4), 1523-1539, 2022 | 9 | 2022 |
Comparing formal models of IoT app coordination analysis C Stevens, M Alhanahnah, Q Yan, H Bagheri Proceedings of the 3rd ACM SIGSOFT International Workshop on Software …, 2020 | 7 | 2020 |
Towards best secure coding practice for implementing SSL/TLS M Alhanahnah, Q Yan IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018 | 7 | 2018 |
Robust learning against relational adversaries Y Wang, M Alhanahnah, X Meng, K Wang, M Christodorescu, S Jha Advances in Neural Information Processing Systems 35, 16246-16260, 2022 | 6 | 2022 |
Boosting usability for protecting online banking applications against APTs M Alhanahnah, D Chadwick 2016 Cybersecurity and Cyberforensics Conference (CCC), 70-76, 2016 | 5 | 2016 |
Machine Learning Containers are Bloated and Vulnerable H Zhang, FA Ahmed, D Fatih, A Kitessa, M Alhanahnah, P Leitner, ... arXiv preprint arXiv:2212.09437, 2022 | 2 | 2022 |
DepesRAG: Towards Managing Software Dependencies using Large Language Models M Alhanahnah, Y Boshmaf, B Baudry arXiv preprint arXiv:2405.20455, 2024 | | 2024 |
An Empirical Evaluation of Pre-trained Large Language Models for Repairing Declarative Formal Specifications M Alhanahnah, MR Hasan, H Bagheri arXiv preprint arXiv:2404.11050, 2024 | | 2024 |
Machine Learning Systems are Bloated and Vulnerable H Zhang, M Alhanahnah, FA Ahmed, D Fatih, P Leitner, A Ali-Eldin Proceedings of the ACM on Measurement and Analysis of Computing Systems 8 (1 …, 2024 | | 2024 |
Method and apparatus for improved security in trigger action platforms Y Chen, M Alhanahnah, A Sabelfeld, R Chatterjee, E Fernandes US Patent 11,856,000, 2023 | | 2023 |