Detection of advanced persistent threat using machine-learning correlation analysis I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ... Future Generation Computer Systems 89, 349-359, 2018 | 338 | 2018 |
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi, T Baker, M Hammoudeh, ... Sensors 19 (8), 1788, 2019 | 300 | 2019 |
Security threats to critical infrastructure: the human factor I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ... The Journal of Supercomputing, 1-17, 2018 | 273 | 2018 |
Social engineering attack strategies and defence approaches I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 139 | 2016 |
A survey on network security monitoring systems I Ghafir, V Prenosil, J Svoboda, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 136 | 2016 |
Advanced persistent threat attack detection: An overview I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security (IJCNS), 2014 | 121 | 2014 |
Hidden Markov models and alert correlations for the prediction of advanced persistent threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 100 | 2019 |
Network monitoring approaches: An overview J Svoboda, I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security …, 2015 | 99 | 2015 |
BotDet: A system for real time botnet command and control traffic detection I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf IEEE Access 6, 38947-38958, 2018 | 93 | 2018 |
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza Proceedings of the International Conference on Future Networks and …, 2017 | 63 | 2017 |
Proposed approach for targeted attacks detection I Ghafir, V Prenosil Advanced Computer and Communication Engineering Technology, 73-80, 2016 | 63 | 2016 |
Blacklist-based malicious ip traffic detection I Ghafir, V Prenosil 2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015 | 57 | 2015 |
Anomaly Detection Using Dynamic Time Warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 51 | 2019 |
Tor-based malware and Tor connection detection I Ghafir, J Svoboda, V Prenosil IET Digital Library, 2014 | 48 | 2014 |
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ... Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 47 | 2018 |
A survey on botnet command and control traffic detection I Ghafir, J Svoboda, V Prenosil International Journal of Advances in Computer Networks and its security …, 2015 | 47 | 2015 |
Unsupervised Learning for Feature Selection: A proposed Solution for Botnet Detection in 5 G Networks M Lefoane, I Ghafir, S Kabir, IU Awan IEEE Transactions on Industrial Informatics, 2022 | 44 | 2022 |
Multi-stage attack detection using contextual information FJ Aparicio-Navarro, KG Kyriakopoulos, I Ghafir, S Lambotharan, ... MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018 | 44 | 2018 |
Advanced persistent threat and spear phishing emails I Ghafir, V Přenosil Proceedings of International Conference on Distance Learning, Simulation and …, 2015 | 44 | 2015 |
DNS traffic analysis for malicious domains detection I Ghafir, V Prenosil 2015 2nd International Conference on Signal Processing and Integrated …, 2015 | 42 | 2015 |