Ransomware detection using the dynamic analysis and machine learning: A survey and research directions U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb, MA Rassam Applied Sciences 12 (1), 172, 2021 | 145 | 2021 |
A financial fraud detection model based on LSTM deep learning technique Y Alghofaili, A Albattah, MA Rassam Journal of Applied Security Research 15 (4), 498-516, 2020 | 102 | 2020 |
An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications FA Ghaleb, A Zainal, MA Rassam, F Mohammed 2017 IEEE conference on application, information and network security (AINS …, 2017 | 102 | 2017 |
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues MA Rassam, A Zainal, MA Maarof Sensors 13 (8), 10087-10122, 2013 | 94 | 2013 |
A survey of intrusion detection schemes in wireless sensor networks MA Rassam, MA Maarof, A Zainal American Journal of Applied Sciences 9 (10), 1636, 2012 | 93 | 2012 |
Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense A Alotaibi, MA Rassam Future Internet 15 (2), 62, 2023 | 81 | 2023 |
Secure cloud infrastructure: A survey on issues, current solutions, and open challenges Y Alghofaili, A Albattah, N Alrajeh, MA Rassam, BAS Al-Rimy Applied Sciences 11 (19), 9005, 2021 | 70 | 2021 |
Adaptive and online data anomaly detection for wireless sensor systems MA Rassam, MA Maarof, A Zainal Knowledge-Based Systems 60, 44-57, 2014 | 68 | 2014 |
Improved vehicle positioning algorithm using enhanced innovation-based adaptive Kalman filter FA Ghaleb, A Zainal, MA Rassam, A Abraham Pervasive and Mobile Computing 40, 139-155, 2017 | 66 | 2017 |
A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique Y Alghofaili, MA Rassam Sensors 22 (2), 634, 2022 | 65 | 2022 |
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency … FA Ghaleb, MA Maarof, A Zainal, MA Rassam, F Saeed, M Alsaedi Vehicular Communications 20, 100186, 2019 | 55 | 2019 |
Artificial immune network clustering approach for anomaly intrusion detection MA Rassam, MA Maarof Journal of Advances in Information Technology 3 (3), 147-154, 2012 | 49 | 2012 |
A combined text-based and metadata-based deep-learning framework for the detection of spam accounts on the social media platform twitter AS Alhassun, MA Rassam Processes 10 (3), 439, 2022 | 48 | 2022 |
Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends. MA Rassam, M Maarof, A Zainal Journal of Information Assurance & Security 12 (4), 2017 | 39 | 2017 |
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications MA Rassam, A Zainal, MA Maarof Applied Soft Computing 13 (4), 1978-1996, 2013 | 39 | 2013 |
A sinkhole attack detection scheme in mintroute wireless sensor networks MA Rassam, A Zainal, MA Maarof, M Al-Shaboti 2012 International Symposium on Telecommunication Technologies, 71-75, 2012 | 37 | 2012 |
A correlation-based anomaly detection model for wireless body area networks using convolutional long short-term memory neural network A Albattah, MA Rassam Sensors 22 (5), 1951, 2022 | 28 | 2022 |
An efficient distributed anomaly detection model for wireless sensor networks MA Rassam, A Zainal, MA Maarof AASRI Procedia 5, 9-14, 2013 | 27 | 2013 |
Principal component analysis–based data reduction model for wireless sensor networks MA Rassam, A Zainal, MA Maarof International Journal of Ad Hoc and Ubiquitous Computing 18 (1-2), 85-101, 2015 | 21 | 2015 |
One-class principal component classifier for anomaly detection in wireless sensor network MA Rassam, A Zainal, MA Maarof 2012 Fourth International Conference on Computational Aspects of Social …, 2012 | 21 | 2012 |