A comprehensive survey of AI-enabled phishing attacks detection techniques A Basit, M Zafar, X Liu, AR Javed, Z Jalil, K Kifayat Telecommunication Systems 76, 139-154, 2021 | 326 | 2021 |
An access control model for cloud computing YA Younis, K Kifayat, M Merabti Journal of Information Security and Applications 19 (1), 45-60, 2014 | 226 | 2014 |
Lightweight sybil attack detection in manets S Abbas, M Merabti, D Llewellyn-Jones, K Kifayat IEEE systems journal 7 (2), 236-248, 2012 | 209 | 2012 |
A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat, TR Gadekallu IEEE Access 10, 11065-11089, 2022 | 103 | 2022 |
Secure cloud computing for critical infrastructure: A survey YA Younis, K Kifayat Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610, 2013 | 89 | 2013 |
Survey on revocation in ciphertext-policy attribute-based encryption RR Al-Dahhan, Q Shi, GM Lee, K Kifayat Sensors 19 (7), 1695, 2019 | 71 | 2019 |
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel PR McWhirter, K Kifayat, Q Shi, B Askwith Journal of information security and applications 40, 199-216, 2018 | 61 | 2018 |
Cyber security teaching and learning laboratories: A survey L Topham, K Kifayat, YA Younis, Q Shi, B Askwith Information & Security 35 (1), 51, 2016 | 57 | 2016 |
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning S Khan, K Kifayat, A Kashif Bashir, A Gurtov, M Hassan Transactions on Emerging Telecommunications Technologies 32 (6), e4062, 2021 | 47 | 2021 |
Security in wireless sensor networks K Kifayat, M Merabti, Q Shi, D Llewellyn-Jones Handbook of Information and Communication Security, 513-552, 2010 | 46 | 2010 |
Body area networks for movement analysis in physiotherapy treatments K Kifayat, P Fergus, S Cooper, M Merabti 2010 IEEE 24th International Conference on Advanced Information Networking …, 2010 | 44 | 2010 |
Intrusion prediction systems M Abdlhamed, K Kifayat, Q Shi, W Hurst Information fusion for cyber-security analytics, 155-174, 2017 | 42 | 2017 |
A new prime and probe cache side-channel attack for cloud computing YA Younis, K Kifayat, Q Shi, B Askwith 2015 IEEE International Conference on Computer and Information Technology …, 2015 | 42 | 2015 |
A secure scheme for a smart house based on Cloud of Things (CoT) B Alohali, M Merabti, K Kifayat 2014 6th Computer Science and Electronic Engineering Conference (CEEC), 115-120, 2014 | 41 | 2014 |
A framework for physical health improvement using wireless sensor networks and gaming P Fergus, K Kifayat, S Cooper, M Merabti, A El Rhalibi 2009 3rd international conference on pervasive computing technologies for …, 2009 | 31 | 2009 |
Social media content classification and community detection using deep learning and graph analytics M Ali, M Hassan, K Kifayat, JY Kim, S Hakak, MK Khan Technological Forecasting and Social Change 188, 122252, 2023 | 30 | 2023 |
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment T Rose, K Kifayat, S Abbas, M Asim Journal of Parallel and Distributed Computing 145, 124-139, 2020 | 30 | 2020 |
Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University YA Younis, K Kifayat Liverpool John Moores University, 2013 | 25 | 2013 |
A system for intrusion prediction in cloud computing M Abdlhamed, K Kifayat, Q Shi, W Hurst Proceedings of the International Conference on Internet of things and Cloud …, 2016 | 24 | 2016 |
System-of-systems boundary check in a public event scenario B Zhou, O Drew, A Arabo, D Llewellyn-Jones, K Kifayat, M Merabti, Q Shi, ... 2010 5th International Conference on System of Systems Engineering, 1-8, 2010 | 24 | 2010 |