Network traffic classification: Techniques, datasets, and challenges A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour Digital Communications and Networks 10 (3), 676-692, 2024 | 113 | 2024 |
Machine learning based botnet identification traffic A Azab, M Alazab, M Aiash 2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016 | 112 | 2016 |
Mining malware to detect variants A Azab, R Layton, M Alazab, J Oliver 2014 fifth cybercrime and trustworthy computing conference, 44-53, 2014 | 73 | 2014 |
Msic: malware spectrogram image classification A Azab, M Khasawneh IEEE access 8, 102007-102021, 2020 | 45 | 2020 |
Convergence of IoT and cognitive radio networks: A survey of applications, techniques, and challenges M Khasawneh, A Azab, S Alrabaee, H Sakkal, HH Bakhit IEEE Access 11, 71097-71112, 2023 | 38 | 2023 |
Characterising network traffic for skype forensics A Azab, P Watters, R Layton 2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012 | 30 | 2012 |
Authorship analysis of the Zeus botnet source code R Layton, A Azab 2014 Fifth Cybercrime and Trustworthy Computing Conference, 38-43, 2014 | 20 | 2014 |
Towards securing routing based on nodes behavior during spectrum sensing in cognitive radio networks M Khasawneh, A Azab, A Agarwal IEEE Access 8, 171512-171527, 2020 | 17 | 2020 |
Skype traffic classification using cost sensitive algorithms A Azab, R Layton, M Alazab, P Watters 2013 Fourth Cybercrime and Trustworthy Computing Workshop, 14-21, 2013 | 10 | 2013 |
Packing resistant solution to group malware binaries A Azab International Journal of Security and Networks 15 (3), 123-132, 2020 | 5 | 2020 |
Trends in crime toolkit development A Khraisat, A Alazab, M Hobbs, JH Abawajy, A Azab Network Security Technologies: Design and Applications, 28-43, 2014 | 5 | 2014 |
The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows A Azab International Journal of Information and Computer Security 17 (3-4), 332-350, 2022 | 3 | 2022 |
AVOCAD: Adaptive terrorist comms surveillance and interception using machine learning A Azab, O Maruatona, P Watters 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 3 | 2019 |
Classification of Network Information Flow Analysis (CONIFA) to Detect New Application Versions A Azab Federation University Australia, 2015 | 2 | 2015 |
An Internet of Things-based System Towards Detecting Oil Spills M Khasawneh, A Azab, S AlRabaee 2023 International Conference on Intelligent Computing, Communication …, 2023 | 1 | 2023 |
Data Mining for Skype Forensics A Azab CreateSpace Independent Publishing Platform, 2012 | | 2012 |
CTC 2012 D Sun, W Liu, P Ren, D Sun, R Layton, S McCombie, P Watters, ... | | |
CTC 2014 S Ishihara | | |