Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance

M Alazab, S Alhyari, A Awajan, AB Abdallah - Cluster Computing, 2021 - Springer
Blockchain overcomes numerous complicated problems related to confidentiality, integrity,
availability of fast and secure distributed systems. Using data from a cross-sectoral survey of …

COVID-19 prediction and detection using deep learning

M Alazab, A Awajan, A Mesleh… - International Journal of …, 2020 - cspub-ijcisim.org
Currently, the detection of coronavirus disease 2019 (COVID-19) is one of the main
challenges in the world, given the rapid spread of the disease. Recent statistics indicate that …

Intelligent mobile malware detection using permission requests and API calls

M Alazab, M Alazab, A Shalaginov, A Mesleh… - Future Generation …, 2020 - Elsevier
Malware is a serious threat that has been used to target mobile devices since its inception.
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm

RK Dhanaraj, RH Jhaveri, L Krishnasamy… - … Journal of Uncertainty …, 2021 - World Scientific
In today's world, one of the most severe attacks that wireless sensor networks (WSNs) face is
a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …

Mining permission patterns for contrasting clean and malicious android applications

V Moonsamy, J Rong, S Liu - Future Generation Computer Systems, 2014 - Elsevier
An Android application uses a permission system to regulate the access to system resources
and users' privacy-relevant information. Existing works have demonstrated several …

[PDF][PDF] Free for all! assessing user data exposure to advertising libraries on android.

S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter - NDSS, 2016 - ndss-symposium.org
Many studies focused on detecting and measuring the security and privacy risks associated
with the integration of advertising libraries in mobile apps. These studies consistently …

Android malware detection using complex-flows

F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …

Automated malware detection in mobile app stores based on robust feature generation

M Alazab - Electronics, 2020 - mdpi.com
Many Internet of Things (IoT) services are currently tracked and regulated via mobile
devices, making them vulnerable to privacy attacks and exploitation by various malicious …

Classification of COVID‐19 and Pneumonia Using Deep Transfer Learning

M Mahin, S Tonmoy, R Islam, T Tazin… - Journal of …, 2021 - Wiley Online Library
The World Health Organization (WHO) recognized COVID‐19 as the cause of a global
pandemic in 2019. COVID‐19 is caused by SARS‐CoV‐2, which was identified in China in …