Survey of intrusion detection systems: techniques, datasets and challenges A Khraisat, I Gondal, P Vamplew, J Kamruzzaman Cybersecurity 2 (1), 1-22, 2019 | 1749 | 2019 |
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges A Khraisat, A Alazab Cybersecurity 4, 1-27, 2021 | 443 | 2021 |
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab Electronics 8 (11), 1210, 2019 | 249 | 2019 |
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine A Khraisat, I Gondal, P Vamplew, J Kamruzzaman, A Alazab Electronics 9 (1), 173, 2020 | 201 | 2020 |
An anomaly intrusion detection system using C5 decision tree classifier A Khraisat, I Gondal, P Vamplew Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 …, 2018 | 104 | 2018 |
Using response action with intelligent intrusion detection and prevention system against web application malware A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab Information Management & Computer Security 22 (5), 431-449, 2014 | 48 | 2014 |
Gondal I Vamplew P Kamruzzaman J A Khraisat Survey of intrusion detection systems: techniques, datasets and challenges …, 2019 | 45 | 2019 |
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019) A Khraisat, I Gondal, P Vamplew, J Kamruzzaman | 45 | 2019 |
Detection of obfuscated malicious JavaScript code A Alazab, A Khraisat, M Alazab, S Singh Future Internet 14 (8), 217, 2022 | 36 | 2022 |
Enhancing K-nearest neighbor algorithm: a comprehensive review and performance analysis of modifications RK Halder, MN Uddin, MA Uddin, S Aryal, A Khraisat Journal of Big Data 11 (1), 113, 2024 | 33 | 2024 |
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2 (1), 1–22 (2019) A Khraisat, I Gondal, P Vamplew, J Kamruzzaman | 31 | |
Routing attacks detection in 6lowpan-based internet of things A Alazab, A Khraisat, S Singh, S Bevinakoppa, OA Mahdi Electronics 12 (6), 1320, 2023 | 30 | 2023 |
Enhancing privacy-preserving intrusion detection through federated learning A Alazab, A Khraisat, S Singh, T Jan Electronics 12 (16), 3382, 2023 | 28 | 2023 |
Maximising competitive advantage on E-business websites: A data mining approach A Alazab, S Bevinakoppa, A Khraisat 2018 IEEE conference on big data and analytics (ICBDA), 111-116, 2018 | 28 | 2018 |
Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity 2, 1 (2019) A Khraisat, I Gondal, P Vamplew, J Kamruzzaman | 26 | 2019 |
Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019; 2: 20 A Khraisat, I Gondal, P Vamplew, J Kamruzzaman URL: https://doi. org/10.1186/s42400-019-0038-7, 2019 | 22 | 2019 |
Crime toolkits: the productisation of cybercrime A Alazab, J Abawajy, M Hobbs, R Layton, A Khraisat 2013 12th IEEE international conference on trust, security and privacy in …, 2013 | 22 | 2013 |
A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools A Alazab, A Khraisat, S Singh IntechOpen, 2023 | 13 | 2023 |
Fake-news detection system using machine-learning algorithms for arabic-language content M Alazab, A Awajan, A Alazab, A Alhyari, R Saadeh Journal of Theoretical and Applied Information Technology 100 (16), 5056-5069, 2022 | 10 | 2022 |
Deep learning-based human activity recognition using CNN, ConvLSTM, and LRCN MA Uddin, MA Talukder, MS Uzzaman, C Debnath, M Chanda, S Paul, ... International Journal of Cognitive Computing in Engineering 5, 259-268, 2024 | 9 | 2024 |