Detection of advanced persistent threat using machine-learning correlation analysis I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ... Future Generation Computer Systems 89, 349-359, 2018 | 334 | 2018 |
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi, T Baker, M Hammoudeh, ... Sensors 19 (8), 1788, 2019 | 299 | 2019 |
Security threats to critical infrastructure: the human factor I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ... The Journal of Supercomputing, 1-17, 2018 | 270 | 2018 |
Social engineering attack strategies and defence approaches I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 138 | 2016 |
A survey on network security monitoring systems I Ghafir, V Prenosil, J Svoboda, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 137 | 2016 |
Advanced persistent threat attack detection: An overview I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security (IJCNS), 2014 | 120 | 2014 |
Network monitoring approaches: An overview J Svoboda, I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security …, 2015 | 99 | 2015 |
Hidden Markov models and alert correlations for the prediction of advanced persistent threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 98 | 2019 |
BotDet: A system for real time botnet command and control traffic detection I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf IEEE Access 6, 38947-38958, 2018 | 94 | 2018 |
Proposed approach for targeted attacks detection I Ghafir, V Prenosil Advanced Computer and Communication Engineering Technology, 73-80, 2016 | 64 | 2016 |
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza Proceedings of the International Conference on Future Networks and …, 2017 | 61 | 2017 |
Blacklist-based malicious ip traffic detection I Ghafir, V Prenosil 2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015 | 56 | 2015 |
Anomaly Detection Using Dynamic Time Warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 52 | 2019 |
Multi-stage attack detection using contextual information FJ Aparicio-Navarro, KG Kyriakopoulos, I Ghafir, S Lambotharan, ... MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018 | 50 | 2018 |
Tor-based malware and Tor connection detection I Ghafir, J Svoboda, V Prenosil IET Digital Library, 2014 | 48 | 2014 |
A survey on botnet command and control traffic detection I Ghafir, J Svoboda, V Prenosil International Journal of Advances in Computer Networks and its security …, 2015 | 47 | 2015 |
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ... Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 46 | 2018 |
Unsupervised Learning for Feature Selection: A proposed Solution for Botnet Detection in 5 G Networks M Lefoane, I Ghafir, S Kabir, IU Awan IEEE Transactions on Industrial Informatics, 2022 | 45 | 2022 |
Machine Learning for Botnet Detection: An Optimized Feature Selection Approach M Lefoane, I Ghafir, S Kabir, IU Awan The 5th International Conference on Future Networks & Distributed Systems …, 2021 | 42 | 2021 |
Advanced persistent threat and spear phishing emails I Ghafir, V Přenosil Proceedings of International Conference on Distance Learning, Simulation and …, 2015 | 41 | 2015 |