Your selections:
A Reinforcement learning based algorithm towards energy efficient 5G Multi-tier network
- Islam, Nahina, Alazab, Ammar, Alazab, Mamoun
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Effective digital forensic analysis of the NTFS disk image
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Forensic identification and detection of hidden and obfuscated malware
GOM: New Genetic Optimizing Model for broadcasting tree in MANET
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollahian, Mali, Islam, Rafiqul, Yearwood, John
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollalihiand, Mali, Islam, Rafiqul, Yearwood, John
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Malicious code detection using penalized splines on OPcode frequency
- Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
- Chen, Qian, Yao, Lin, Wu, Yulin, Wang, Xuan, Zhang, Weizhe, Jiang, Zoe, Liu, Yang, Alazab, Mamoun
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?