Follow
Ansam Khraisat
Ansam Khraisat
Verified email at Deakin.edu.au
Title
Cited by
Cited by
Year
Survey of intrusion detection systems: techniques, datasets and challenges
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman
Cybersecurity 2 (1), 1-22, 2019
17532019
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab
Cybersecurity 4, 1-27, 2021
4382021
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab
Electronics 8 (11), 1210, 2019
2492019
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab
Electronics 9 (1), 173, 2020
2002020
An anomaly intrusion detection system using C5 decision tree classifier
A Khraisat, I Gondal, P Vamplew
Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 …, 2018
1032018
Using response action with intelligent intrusion detection and prevention system against web application malware
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab
Information Management & Computer Security 22 (5), 431-449, 2014
482014
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019)
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman
462019
Gondal I Vamplew P Kamruzzaman J
A Khraisat
Survey of intrusion detection systems: techniques, datasets and challenges …, 2019
452019
Detection of obfuscated malicious JavaScript code
A Alazab, A Khraisat, M Alazab, S Singh
Future Internet 14 (8), 217, 2022
352022
Enhancing K-nearest neighbor algorithm: a comprehensive review and performance analysis of modifications
RK Halder, MN Uddin, MA Uddin, S Aryal, A Khraisat
Journal of Big Data 11 (1), 113, 2024
312024
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2 (1), 1–22 (2019)
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman
31
Routing attacks detection in 6lowpan-based internet of things
A Alazab, A Khraisat, S Singh, S Bevinakoppa, OA Mahdi
Electronics 12 (6), 1320, 2023
292023
Maximising competitive advantage on E-business websites: A data mining approach
A Alazab, S Bevinakoppa, A Khraisat
2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018
282018
Enhancing privacy-preserving intrusion detection through federated learning
A Alazab, A Khraisat, S Singh, T Jan
Electronics 12 (16), 3382, 2023
262023
Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity 2, 1 (2019)
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman
262019
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019; 2: 20
A Khraisat, I Gondal, P Vamplew, J Kamruzzaman
URL: https://doi. org/10.1186/s42400-019-0038-7, 2019
222019
Crime toolkits: the productisation of cybercrime
A Alazab, J Abawajy, M Hobbs, R Layton, A Khraisat
2013 12th IEEE international conference on trust, security and privacy in …, 2013
222013
A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools
A Alazab, A Khraisat, S Singh
IntechOpen, 2023
132023
Fake-news detection system using machine-learning algorithms for arabic-language content
M Alazab, A Awajan, A Alazab, A Alhyari, R Saadeh
Journal of Theoretical and Applied Information Technology 100 (16), 5056-5069, 2022
102022
Smart contract-based access control framework for internet of things devices
MR Hasan, A Alazab, SB Joy, MN Uddin, MA Uddin, A Khraisat, I Gondal, ...
Computers 12 (11), 240, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20