Towards enhancing the security of oauth implementations in smart phones M Shehab, F Mohsen 2014 IEEE International Conference on Mobile Services, 39-46, 2014 | 44 | 2014 |
Android keylogging threat F Mohsen, M Shehab 9th IEEE International Conference on Collaborative Computing: Networking …, 2013 | 35 | 2013 |
Securing OAuth implementations in smart phones M Shehab, F Mohsen Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 22 | 2014 |
A taxonomic classification of insider threats: Existing techniques, future directions & recommendations U Rauf, F Mohsen, Z Wei Journal of Cyber Security and Mobility 12 (2), 221-252, 2023 | 12 | 2023 |
Hardening the oauth-webview implementations in android applications by re-factoring the chromium library F Mohsen, M Shehab 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 12 | 2016 |
Countering intrusiveness using new security-centric ranking algorithm built on top of elasticsearch F Mohsen, H Abdelhaq, H Bisgin, A Jolly, M Szczepanski 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 10 | 2018 |
Detecting Android malwares by mining statically registered broadcast receivers F Mohsen, H Bisgin, Z Scott, K Strait 2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017 | 10 | 2017 |
Investigating the keylogging threat in android - User perspective (Regular research paper) F Mohsen, E Bello-Ogunu, M Shehab 2016 Second International Conference on Mobile and Secure Services …, 2016 | 9 | 2016 |
Private and anonymous data storage and distribution in cloud Q Duan, Y Wang, F Mohsen, E Al-Shaer 2013 IEEE International Conference on Services Computing, 264-271, 2013 | 6 | 2013 |
The listening patterns to system events by benign and malicious android apps F Mohsen, M Shehab 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 5 | 2016 |
Security‐centric ranking algorithm and two privacy scores to mitigate intrusive apps F Mohsen, H Abdelhaq, H Bisgin Concurrency and Computation: Practice and Experience 34 (14), e6571, 2022 | 4 | 2022 |
A formal model for sustainable vehicle-to-grid management MA Rahman, F Mohsen, E Al-Shaer Proceedings of the first ACM workshop on Smart energy grid security, 81-92, 2013 | 4 | 2013 |
Early detection of violating mobile apps: A data-driven predictive model approach F Mohsen, D Karastoyanova, G Azzopardi Systems and Soft Computing 4, 200045, 2022 | 3 | 2022 |
A Taxonomy for Large-Scale Cyber Security Attacks F Mohsen, C Zwart, D Karastoyanova, G Gaydadjiev EAI Endorsed Transactions on Cloud Systems 7, 2022 | 3 | 2022 |
Enhancing malware detection in Android application by incorporating broadcast receivers H Bisgin, F Mohsen, V Nwobodo, R Havens International Journal of Information Privacy, Security and Integrity 5 (1 …, 2021 | 3 | 2021 |
Quantifying information exposure by web browsers F Mohsen, M Shehab, M Lange, D Karastoyanova Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3, 648-667, 2021 | 3 | 2021 |
POSTER: Android System Broadcast Actions Broadcasts Your Privacy F Mohsen, M Shehab, E Bello-Ogunu, A Al Jarrah Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 3 | 2014 |
E-Watcher: insider threat monitoring and detection for enhanced security Z Wei, U Rauf, F Mohsen Annals of Telecommunications, 1-13, 2024 | 2 | 2024 |
Employee watcher: a machine learning-based hybrid insider threat detection framework U Rauf, Z Wei, F Mohsen 2023 7th Cyber Security in Networking Conference (CSNet), 39-45, 2023 | 2 | 2023 |
An approach to guide users towards less revealing internet browsers F Mohsen, A Shtayyeh, M Struijk, R Naser, L Mohammad Emerging Trends in Cybersecurity Applications, 69-94, 2022 | 2 | 2022 |