Takip et
Marwan Omar
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
812022
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
772015
Cyber security and mobile threats: The need for antivirus applications for smart phones
J Wright, ME Dawson Jr, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
522012
Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
D Mohammed, M Omar, V Nguyen
Journal of Research in Business, Economics and Management 10 (2), 1860-1864, 2018
412018
Cloud computing security: abuse and nefarious use of cloud computing
YA Hamza, MD Omar
Int. J. Comput. Eng. Res 3 (6), 22-27, 2013
412013
Security solutions for hyperconnectivity and the Internet of things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
392016
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions. Springer Brief
M Omar
https://link.springer.com/book/978303115, 2022
37*2022
Understanding the methods behind cyber terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology, Third Edition, 1539-1549, 2015
372015
Heart failure patients monitoring using IoT-based remote monitoring system
M Umer, T Aljrees, H Karamti, A Ishaq, S Alsubai, M Omar, AK Bashir, ...
Scientific Reports 13 (1), 19213, 2023
362023
Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
MF Ayub, X Li, K Mahmood, S Shamshad, MA Saleem, M Omar
IEEE Transactions on Consumer Electronics 70 (1), 1370-1379, 2023
322023
Insider threats: Detecting and controlling malicious insiders
M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162-172, 2015
312015
Net neutrality around the globe: A survey
V Nguyen, D Mohammed, M Omar, P Dean
2020 3rd International Conference on Information and Computer Technologies …, 2020
292020
Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in vanet
MA Saleem, X Li, K Mahmood, S Shamshad, MF Ayub, AK Bashir, ...
IEEE Transactions on Consumer Electronics 70 (1), 1747-1756, 2023
262023
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
262013
Security breaches in the healthcare domain: a spatiotemporal analysis
M Al Kinoon, M Omar, M Mohaisen, D Mohaisen
Computational Data and Social Networks: 10th International Conference …, 2021
252021
Do Generative large language models need billions of parameters?
S Gholami
Redefining security with cyber AI, 37-55, 2024
242024
Text-defend: Detecting adversarial examples using local outlier factor
M Omar, G Sukthankar
2023 IEEE 17th international conference on semantic computing (ICSC), 118-122, 2023
242023
Application of machine learning (ML) to address cybersecurity threats
M Omar
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, 1-11, 2022
242022
Malware anomaly detection using local outlier factor technique
M Omar
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, 37-48, 2022
232022
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
M Omar, D Mohammed, V Nguyen
International Journal of Business Process Integration and Management 8 (2 …, 2017
232017
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20