Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks ZA Baig, SM Sait, F Binbeshr Computer Networks 97, 31-47, 2016 | 47 | 2016 |
A systematic review of PIN-entry methods resistant to shoulder-surfing attacks F Binbeshr, MLM Kiah, LY Por, AA Zaidan computers & security 101, 102116, 2021 | 42 | 2021 |
Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures ZA Baig, F Binbeshr 2013 International Conference on Cloud Computing and Big Data, 346-353, 2013 | 42 | 2013 |
UCloud: A simulated Hybrid Cloud for a university environment MH Sqalli, M Al-Saeedi, F Binbeshr, M Siddiqui 2012 IEEE 1ST International Conference on Cloud Networking (CLOUDNET), 170-172, 2012 | 33 | 2012 |
Controlled resource access to mitigate economic denial of sustainability attacks against cloud infrastructures ZA Baig, S Sait, FS Binbeshr US Patent App. 14/970,152, 2016 | 22 | 2016 |
A systematic review on hadith authentication and classification methods F Binbeshr, A Kamsin, M Mohammed Transactions on Asian and Low-Resource Language Information Processing 20 (2 …, 2021 | 13 | 2021 |
Secure pin-entry method using one-time pin (OTP) F Binbeshr, LY Por, MLM Kiah, AA Zaidan, M Imam IEEE Access 11, 18121-18133, 2023 | 11 | 2023 |
A systematic literature review on the methods and challenges in detecting zero-day attacks: Insights from the recent crowdstrike incident LY Por, Z Dai, SJ Leem, Y Chen, J Yang, F Binbeshr, KY Phan, CS Ku IEEE Access, 2024 | 3 | 2024 |
Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks F Binbeshr, L Yee, ML Kiah Challenge-Response Pin Authentication System to Withstand Shoulder Surfing …, 2023 | 1 | 2023 |
Ransomware Detection on IoT Edge Using Optimized Deep Representation Learning Y Almasri, MDS Islam, M Elnour, MW Shinwari, F Binbeshr, A Mahmoud, ... | | 2025 |
A systematic review of graphical password methods resistant to shoulder-surfing attacks F Binbeshr, KC Siong, L Yee, M Imam, AA Al-Saggaf, AA Abudaqa International Journal of Information Security 24 (1), 1-22, 2025 | | 2025 |
The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches F Binbeshr, M Imam, M Ghaleb, M Hamdan, MA Rahim, M Hammoudeh IEEE Open Journal of the Computer Society, 2025 | | 2025 |
A Systematic Literature Review on AI-Based Methods and Challenges in Detecting Zero-Day Attacks L Yee Por, Z Dai, S Juan Leem, Y Chen, J Yang, F Binbeshr, ... IEEE Access 12, 144150-144163, 2024 | | 2024 |
A Secure Pin-Entry Method Resistant to Shoulder-Surfing and Recording Attacks FSS Binbeshr PQDT-Global, 2022 | | 2022 |
Controlled access to cloud resources for mitigating economic denial of sustainability (EDOS) attack FS Binbeshr PQDT-Global, 2014 | | 2014 |
PIN (OTP) F BINBESHR, M KIAH, AA ZAIDAN, M IMAM | | |