A lightweight perceptron-based intrusion detection system for fog computing B Sudqi Khater, AWB Abdul Wahab, MYIB Idris, M Abdulla Hussain, ... applied sciences 9 (1), 178, 2019 | 135 | 2019 |
SECaaS: security as a service for cloud-based applications M Hussain, H Abdulsalam Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-4, 2011 | 77 | 2011 |
UMLintr: a UML profile for specifying intrusions M Hussein, M Zulkernine 13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006 | 70 | 2006 |
The impact of cloud computing on ITIL service strategy processes MB Al Mourad, M Hussain International Journal of Computer and Communication Engineering 3 (5), 367, 2014 | 43 | 2014 |
Drone Forensics: A Detailed Analysis of Emerging DJI Models M Yousef, F Iqbal, M Hussain International conference on information and communication systems, 66-71, 2020 | 42 | 2020 |
Intrusion detection aware component-based systems: A specification-based framework M Hussein, M Zulkernine Journal of Systems and Software 80 (5), 700-710, 2007 | 39 | 2007 |
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security BS Khater, AWA Wahab, MYI Idris, M Hussain, AA Ibrahim, MA Amin, ... Electronics 10 (14), 1633, 2021 | 38 | 2021 |
Digital wellbeing tools through users lens MB Almourad, A Alrobai, T Skinner, M Hussain, R Ali Technology in Society 67, 101778, 2021 | 32 | 2021 |
Mining Educational Data for Academic Accreditation: Aligning Assessment with Outcomes M Hussain, M Al-Mourad, S Mathew, A Hussein Global Journal of Flexible Systems Management 18 (1), 51–60, 2017 | 23 | 2017 |
Software quality in the clouds: a cloud-based solution M Hussain, HM Abdulsalam Cluster Computing 17, 389-402, 2014 | 23 | 2014 |
Effective third party auditing in cloud computing M Hussain, MB Al-Mourad 2014 28th International Conference on Advanced Information Networking and …, 2014 | 19 | 2014 |
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review R Ali, A Ali, F Iqbal, M Hussain, F Ullah, A Michienzi Security and Communication Networks 2022 (2959222), 2022 | 17 | 2022 |
Trust in Mobile Cloud Computing with LTE-based Deployment M Hussain, B Almourad IEEE Conference on Scalable Computing and Communications, 643-648, 2014 | 17 | 2014 |
Digital forensic acquisition and analysis of discord applications M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem 2020 international conference on communications, computing, cybersecurity …, 2020 | 16 | 2020 |
The design and applications of a privacy-preserving identity and trust-management system M Hussain Canadian theses, 2010 | 16 | 2010 |
Analysis of WCAG 2.0 data accessibility success criterion of e-government websites MB Almourad, M Hussain, F Kamoun, Z Wattar Periodicals of Engineering and Natural Sciences 7 (1), 496-503, 2019 | 14 | 2019 |
Using deep learning to detect social media ‘trolls’ Á MacDermott, M Motylinski, F Iqbal, K Stamp, M Hussain, A Marrington Forensic Science International: Digital Investigation 43, 301446, 2022 | 13 | 2022 |
Forensic analysis of the Cisco WebEx application Z Khalid, F Iqbal, F Kamoun, M Hussain, LA Khan 2021 5th Cyber Security in Networking Conference (CSNet), 90-97, 2021 | 12 | 2021 |
Well-formed semantic model for co-Learning J Alomari, M Hussain, S Turki, M Masud Computers in Human Behavior, 2015 | 12 | 2015 |
Collect, Scope, and Verify Big Data – A Framework for Institution Accreditation M Hussain, M Al-Mourad, S Mathew Advanced Information Networking and Applications Workshops (WAINA), 2016 …, 2016 | 9 | 2016 |