Your selections:
Towards automatic image segmentation using optimised region growing technique
- Nicholson, Ann, Li, Xiaodong, Alazab, Mamoun, Islam, Mofakharul, Venkatraman, Sitalakshmi
Effective digital forensic analysis of the NTFS disk image
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Towards understanding and improving E-government strategies in Jordan
- Alkhaleefah, Mohammad, Alkhawaldeh, Mahmoud, Venkatraman, Sitalakshmi, Alazab, Mamoun
Stochastic model based approach for biometric identification
- Islam, Mofakharul, Venkatraman, Sitalakshmi, Alazab, Mamoun
Six sigma approach to improve quality in e-services: An empirical study in Jordan
- Alhyari, Salah, Alazab, Moutaz, Venkatraman, Sitalakshmi, Alazab, Mamoun, Alazab, Ammar
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Malicious code detection using penalized splines on OPcode frequency
- Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollahian, Mali, Islam, Rafiqul, Yearwood, John
- Chen, Qian, Yao, Lin, Wu, Yulin, Wang, Xuan, Zhang, Weizhe, Jiang, Zoe, Liu, Yang, Alazab, Mamoun
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollalihiand, Mali, Islam, Rafiqul, Yearwood, John
Are you sure you would like to clear your session, including search history and login status?