Ashraf J; Moustafa N; Bukhshi AD; Javed A, 2021, 'Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques', in
Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW, IEEE, pp. 46 - 52, presented at 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), 25 October 2021 - 29 October 2021,
http://dx.doi.org/10.1109/EDOCW52865.2021.000312021
Yang S; Guo H; Moustafa N, 2021, 'Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network', in
IEEE International Conference on Software Quality, Reliability and Security, QRS, IEEE, pp. 829 - 840, presented at 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), 06 December 2021 - 10 December 2021,
http://dx.doi.org/10.1109/QRS54544.2021.000922021
Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, IEEE, pp. 887 - 894, presented at 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 20 October 2021 - 22 October 2021,
http://dx.doi.org/10.1109/TrustCom53373.2021.001252021
Sarhan M; Layeghy S; Moustafa N; Portmann M, 2021, 'NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems', in
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 117 - 135,
http://dx.doi.org/10.1007/978-3-030-72802-1_92021
Moustafa N; Jolfaei A, 2020, 'Autonomous detection of malicious events using machine learning models in drone networks', in
DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, ACM, pp. 61 - 66, presented at MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking,
http://dx.doi.org/10.1145/3414045.34159512020
Wu P; Guo H; Moustafa N, 2020, 'Pelican: A Deep Residual Network for Network Intrusion Detection', in
Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, IEEE, pp. 55 - 62, presented at 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 29 June 2020 - 02 July 2020,
http://dx.doi.org/10.1109/DSN-W50199.2020.000182020
Wu P; Moustafa N; Yang S; Guo H, 2020, 'Densely Connected Residual Network for Attack Recognition', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
2020
Hassan M; Moustafa N; Sitnikova E; Turnbull B; Vatsalan D, 2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
2020
Hassanin M; Moustafa N; Tahtali M, 2020, 'A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models', Canberra, Australia, presented at The 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 04 December 2020
2020
Alkadi O; Moustafa N; Turnbull B, 2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
2020
Yamany W; Moustafa N; Turnbull B, 2020, 'A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', Canberra, Australia, presented at The 33rd Australasian Joint Conference on Artificial Intelligence (AJCAI 2020), Canberra, Australia, 16 December 2020
2020
Koroniotis N; Moustafa N, 2020, 'Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework', Sydney, Australia, presented at 7th International Conference on Security and its Applications (CNSA 2020), Sydney, Australia, 28 March 2020 - 29 March 2020
2020
Moustafa N; Salim S; Turnbull B, 2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
2020
schiliro F; Beheshti A; Moustafa N, 2020, 'A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing', Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 03 September 2020 - 04 March 2020
2020
Moustafa N; Hassan M; Debie E; Janicke H, 2020, 'Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
2020
Debie E; Moustafa N; Whitty M, 2020, 'A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals', in IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, IEEE, Glasgow, United kingdom, presented at IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, Glasgow, United kingdom, 19 July 2020 - 24 July 2020
2020
Moustafa N; Ahmed M; Ahmed S, 2020, 'Data Analytics-enabled Intrusion Detection: Evaluations of Linux ToN_IoT Datasets', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
2020
Weinge B; Kim J; Sim A; Nakashima M; Moustafa N; Wu J, 2020, 'Enhancing IoT Anomaly Detection Performance for Federated Learning', IEEE, Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020 - 19 December 2020,
http://dx.doi.org/10.1109/MSN50589.2020.000452020
Schiliro F; Moustafa N; Beheshti A, 2020, 'Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things', Fiji- Virtual Conference, presented at IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji- Virtual Conference, 14 December 2020 - 16 December 2020
2020
Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
2019
Wilson SW; Moustafa N; Sitnikova E, 2018, 'A Digital Identity Stack to Improve Privacy in the IoT', in
IEEE 4th World Forum on Internet of Things, IEEE, Singapore, pp. 25 - 29, presented at IEEE 4th World Forum on Internet of Things, Singapore, 05 February 2018 - 08 February 2018,
http://dx.doi.org/10.1109/WF-IoT.2018.83551992018
Monks K; Sitnikova E; Moustafa N, 2018, 'Cyber intrusion detection in operations of bulk handling ports', in Josang A (ed.), European Conference on Information Warfare and Security, ECCWS, Academic Conferences and Publishing International Limited, Oslo, Norway, pp. 307 - 316, presented at 17th European Conference on Cyber Warfare and Security ECCWS 2018, Oslo, Norway, 28 June 2018 - 29 June 2018
2018
Moustafa N; Turnbull B; Choo K-KR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', in
Proceedings - 2018 IEEE International Conference on Industrial Internet, ICII 2018, 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, pp. 139 - 145, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018,
http://dx.doi.org/10.1109/ICII.2018.000232018
Hassan MM; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', in
2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, pp. 1 - 6, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017,
http://dx.doi.org/10.1109/MilCIS.2017.81904222017
Moustafa NM; Creech GC; Slay JS, 2017, 'Flow Aggregator Module for Analysing Network Traffic', in Das HD (ed.),
International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, pp. 19 - 29, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017,
http://dx.doi.org/10.1007/978-981-10-7871-2_32017
Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in
9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, pp. 137 - 149, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017,
http://dx.doi.org/10.1007/978-3-319-90775-8_122017
Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2017, 'Towards Developing Network forensic mechanism for Botnet Activities in
the IoT based on Machine Learning Techniques', in
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer International Publishing, Melbourne, Australia, pp. 30 - 44, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
http://dx.doi.org/10.1007/978-3-319-90775-8_32017
Moustafa N; Creech G; Sitnikova E; Hassan M, 2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', in
2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, Australia, pp. 1 - 6, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017,
http://dx.doi.org/10.1109/MilCIS.2017.81904212017
Moustafa NM; Creech GC; SLAY JS, 2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.),
Advances in Intelligent Systems and Computing, School of Computer Engineering, KIIT University, pp. 125 - 135, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017,
http://dx.doi.org/10.1007/978-981-10-7871-2_132017
Marsden T; Moustafa N; Sitnikova E; Creech G, 2017, 'Probability Risk Identification Based Intrusion Detection System for
SCADA Systems', in
Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017,
http://dx.doi.org/10.1007/978-3-319-90775-8_282017
Moustafa N; Slay J, 2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212
2015
Moustafa NM; Slay J, 2015, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', in
The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems, IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 November 2015 - 05 November 2015,
http://dx.doi.org/10.13140/RG.2.1.2264.48832015
Moustafa N; Slay J, 2015, 'A hybrid feature selection for network intrusion detection systems: Central points', in
Security Research Institute, Edith Cowan University, the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November 2015 - 02 December 2015,
http://dx.doi.org/10.4225/75/57a84d4fbefbb2015
Moustafa N; Slay J, 2015, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in
Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, Kyoto, Japan, pp. 25 - 31, presented at 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan, 05 November 2015 - 05 November 2015,
http://dx.doi.org/10.1109/BADGERS.2015.142015
Moustafa N; Slay J, 2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in
2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings,
http://dx.doi.org/10.1109/MilCIS.2015.73489422015
Sarhan M; Layeghy S; Moustafa N; Portmann M, 2023, 'Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection',
Journal of Network and Systems Management, vol. 31,
http://dx.doi.org/10.1007/s10922-022-09691-32023
Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey',
ACM Computing Surveys, vol. 55, pp. 1 - 43,
http://dx.doi.org/10.1145/35608162023
Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2023, 'The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports',
IEEE Transactions on Intelligent Transportation Systems, vol. 24, pp. 2368 - 2381,
http://dx.doi.org/10.1109/TITS.2021.31063782023
Yamany W; Moustafa N; Turnbull B, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems',
IEEE Transactions on Intelligent Transportation Systems, vol. 24, pp. 893 - 903,
http://dx.doi.org/10.1109/TITS.2021.31309062023
Khan IA; Moustafa N; Pi D; Hussain Y; Khan NA, 2023, 'DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks',
IEEE Transactions on Industrial Informatics, vol. 19, pp. 3300 - 3309,
http://dx.doi.org/10.1109/TII.2021.31088112023
Abdel-Basset M; Moustafa N; Hawash H, 2023, 'Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach',
IEEE Transactions on Industrial Informatics, vol. 19, pp. 995 - 1005,
http://dx.doi.org/10.1109/TII.2022.31658692023
Alsaedi A; Tari Z; Mahmud R; Moustafa N; Mahmood A; Anwar A, 2023, 'USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data',
IEEE Transactions on Dependable and Secure Computing, vol. 20, pp. 724 - 739,
http://dx.doi.org/10.1109/TDSC.2022.31434932023
Oseni A; Moustafa N; Creech G; Sohrabi N; Strelzoff A; Tari Z; Linkov I, 2023, 'An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks',
IEEE Transactions on Intelligent Transportation Systems, vol. 24, pp. 1000 - 1014,
http://dx.doi.org/10.1109/TITS.2022.31886712023
Bugshan N; Khalil I; Moustafa N; Rahman MS, 2023, 'Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications',
IEEE Internet of Things Journal, vol. 10, pp. 2821 - 2831,
http://dx.doi.org/10.1109/JIOT.2021.30989802023
Abdel-Basset M; Hawash H; Moustafa N; Mohammad N, 2022, 'H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information',
IEEE Internet of Things Journal, vol. 9, pp. 10010 - 10021,
http://dx.doi.org/10.1109/JIOT.2021.31179092022
Jagatheesaperumal SK; Mishra P; Moustafa N; Chauhan R, 2022, 'A holistic survey on the use of emerging technologies to provision secure healthcare solutions',
Computers and Electrical Engineering, vol. 99,
http://dx.doi.org/10.1016/j.compeleceng.2022.1076912022
Akter M; Moustafa N; Lynar T; Razzak I, 2022, 'Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems',
IEEE Journal of Biomedical and Health Informatics, vol. 26, pp. 5805 - 5816,
http://dx.doi.org/10.1109/JBHI.2022.31926482022
Abdel-Basset M; Moustafa N; Hawash H; Razzak I; Sallam KM; Elkomy OM, 2022, 'Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems',
IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 2523 - 2537,
http://dx.doi.org/10.1109/TITS.2021.31199682022
Khan IA; Moustafa N; Pi D; Sallam KM; Zomaya AY; Li B, 2022, 'A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks',
IEEE Internet of Things Journal, vol. 9, pp. 11604 - 11613,
http://dx.doi.org/10.1109/JIOT.2021.31301562022
Weinger B; Kim J; Sim A; Nakashima M; Moustafa N; Wu KJ, 2022, 'Enhancing IoT anomaly detection performance for federated learning',
Digital Communications and Networks, vol. 8, pp. 314 - 323,
http://dx.doi.org/10.1016/j.dcan.2022.02.0072022
Rahman MA; Mukta MY; Asyhari AT; Moustafa N; Patwary MN; Yousuf A; Razzak I; Gupta BB, 2022, 'Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management',
IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 23771 - 23780,
http://dx.doi.org/10.1109/TITS.2022.32032082022
Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2022, 'Feature extraction for machine learning-based intrusion detection in IoT networks',
Digital Communications and Networks,
http://dx.doi.org/10.1016/j.dcan.2022.08.0122022
Rahman MS; Khalil I; Moustafa N; Kalapaaking AP; Bouras A, 2022, 'A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems',
IEEE Transactions on Industrial Informatics, vol. 18, pp. 5007 - 5017,
http://dx.doi.org/10.1109/TII.2021.31055272022
Schiliro F; Moustafa N; Razzak I; Beheshti A, 2022, 'DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing',
IEEE Transactions on Intelligent Transportation Systems, pp. 1 - 9,
http://dx.doi.org/10.1109/TITS.2022.31666312022
Khan IA; Moustafa N; Pi D; Haider W; Li B; Jolfaei A, 2022, 'An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles',
IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 25469 - 25478,
http://dx.doi.org/10.1109/TITS.2021.31058342022
Abdel-Basset M; Hawash H; Moustafa N, 2022, 'Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions',
IEEE Consumer Electronics Magazine, vol. 11, pp. 56 - 66,
http://dx.doi.org/10.1109/MCE.2021.31172322022
Abdel-Basset M; Gamal A; Moustafa N; Askar SS; Abouhawwash M, 2022, 'A Risk Assessment Model for Cyber-Physical Water and Wastewater Systems: Towards Sustainable Development',
Sustainability (Switzerland), vol. 14, pp. 4480 - 4480,
http://dx.doi.org/10.3390/su140844802022
Debie E; Moustafa N; Vasilakos A, 2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network',
IEEE Transactions on Dependable and Secure Computing, vol. 19, pp. 2488 - 2500,
http://dx.doi.org/10.1109/TDSC.2021.30607752022
Rahman MA; Rahim MA; Rahman MM; Moustafa N; Razzak I; Ahmad T; Patwary MN, 2022, 'A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics',
IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 19727 - 19742,
http://dx.doi.org/10.1109/TITS.2021.31382552022
Razzak I; Moustafa N; Mumtaz S; Xu G, 2022, 'One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data',
International Journal of Intelligent Systems, vol. 37, pp. 4515 - 4536,
http://dx.doi.org/10.1002/int.227292022
Abdel-Basset M; Moustafa N; Hawash H, 2022, 'Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach',
IEEE Transactions on Industrial Informatics, vol. 18, pp. 7920 - 7934,
http://dx.doi.org/10.1109/TII.2022.31676632022
Khan IA; Moustafa N; Razzak I; Tanveer M; Pi D; Pan Y; Ali BS, 2022, 'XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks',
Future Generation Computer Systems, vol. 127, pp. 181 - 193,
http://dx.doi.org/10.1016/j.future.2021.09.0102022
Salim S; Turnbull B; Moustafa N, 2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems',
Ad Hoc Networks, vol. 128,
http://dx.doi.org/10.1016/j.adhoc.2022.1027862022
Al-Doghman F; Moustafa N; Khalil I; Tari Z; Zomaya A, 2022, 'AI-enabled Secure Microservices in Edge Computing: Opportunities and Challenges',
IEEE Transactions on Services Computing,
http://dx.doi.org/10.1109/TSC.2022.31554472022
Koroniotis N; Moustafa N; Slay J, 2022, 'A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks',
Computers and Electrical Engineering, vol. 99, pp. 107745 - 107745,
http://dx.doi.org/10.1016/j.compeleceng.2022.1077452022
Salim S; Moustafa N; Turnbull B; Razzak I, 2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks',
ACM Transactions on Multimedia Computing, Communications and Applications, vol. 18, pp. 1 - 19,
http://dx.doi.org/10.1145/35378992022
Moustafa N; Choo KKR; Abu-Mahfouz AM, 2022, 'Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System',
IEEE Transactions on Industrial Informatics, vol. 18, pp. 1892 - 1895,
http://dx.doi.org/10.1109/TII.2021.31110282022
Qayyum A; Razzak I; Moustafa N; Mazher M, 2022, 'Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children',
Image and Vision Computing, vol. 119,
http://dx.doi.org/10.1016/j.imavis.2022.1043752022
Booij TM; Chiscop I; Meeuwissen E; Moustafa N; Hartog FTHD, 2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets',
IEEE Internet of Things Journal, vol. 9, pp. 485 - 496,
http://dx.doi.org/10.1109/JIOT.2021.30851942022
Ahmed M; Moustafa N; Suaib Akhter AFM; Razzak I; Surid E; Anwar A; Shahen Shah AFM; Zengin A, 2022, 'A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET',
IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 19624 - 19633,
http://dx.doi.org/10.1109/TITS.2021.31152452022
Johnson N; Turnbull B; Reisslein M; Moustafa N, 2022, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification',
IEEE Transactions on Computational Social Systems, pp. 1 - 13,
http://dx.doi.org/10.1109/TCSS.2022.31843872022
Rahim MA; Rahman MA; Rahman MM; Zaman N; Moustafa N; Razzak I, 2022, 'An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health',
IEEE Transactions on Green Communications and Networking, vol. 6, pp. 1298 - 1306,
http://dx.doi.org/10.1109/TGCN.2022.31793502022
Asikuzzaman M; Mareen H; Moustafa N; Choo KKR; Pickering MR, 2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain',
IEEE Access, vol. 10, pp. 15681 - 15698,
http://dx.doi.org/10.1109/ACCESS.2022.31467232022
Modini J; Lynar T; Moustafa N; Sitnikova E; Joiner K, 2021, 'The Application of Epidemiology for Categorising DNS Cyber Risk Factors (submitted)', International Journal of Computers and Communications
2021
Gamal M; Abbas HM; Moustafa N; Sitnikova E; Sadek RA, 2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks',
Computers, Materials and Continua, vol. 69, pp. 1823 - 1837,
http://dx.doi.org/10.32604/cmc.2021.0128772021
Abdel-Basset M; Gamal A; Moustafa N; Abdel-Monem A; El-Saber N, 2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles',
IEEE Access, vol. 9, pp. 107657 - 107679,
http://dx.doi.org/10.1109/ACCESS.2021.30986752021
Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics',
IEEE Access, vol. 9, pp. 114051 - 114069,
http://dx.doi.org/10.1109/ACCESS.2021.31031982021
Salim S; Turnbull B; Moustafa N, 2021, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks',
IEEE Transactions on Computational Social Systems,
http://dx.doi.org/10.1109/TCSS.2021.31344632021
Moustafa N; Hassan M; Choo K-KR; Lynar T; Camtepe S; Whitty M, 2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks',
Future Generation Computer Systems,
http://dx.doi.org/10.1016/j.future.2021.01.0112021
Alsherbiny M; Radwan I; Moustafa N; Bhuyan D; El-Waisi M; Chang D; Li CG, 2021, 'Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations',
IEEE Journal of Biomedical and Health Informatics,
http://dx.doi.org/10.1109/JBHI.2021.31263392021
Akhter S; Shah S; Ahmed M; Moustafa N; Çavuşoğlu U; Zengin A, 2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua
2021
Chaudhry SA; Irshad A; Nebhen J; Bashir AK; Moustafa N; Al-Otaibi YD; Zikria YB, 2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT',
Sustainable Cities and Society, vol. 75, pp. 103322 - 103322,
http://dx.doi.org/10.1016/j.scs.2021.1033222021
Li S; Shen W; Bilal M; Xu X; Dou W; Moustafa N, 2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing',
Journal of Systems Architecture, vol. 119,
http://dx.doi.org/10.1016/j.sysarc.2021.1022732021
Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems',
IEEE Access, vol. 9, pp. 55077 - 55097,
http://dx.doi.org/10.1109/ACCESS.2021.30697372021
Ashraf J; Bakhshi AD; Moustafa N; Khurshid H; Javed A; Beheshti A, 2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems',
IEEE Transactions on Intelligent Transportation Systems, vol. 22, pp. 4507 - 4518,
http://dx.doi.org/10.1109/TITS.2020.30178822021
Al-Hawawreh M; Moustafa N; Slay J, 2021, 'A threat intelligence framework for protecting smart satellite-based healthcare networks',
Neural Computing and Applications, pp. 1 - 21,
http://dx.doi.org/10.1007/s00521-021-06441-52021
Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks',
IEEE Internet of Things Journal, vol. 8, pp. 9463 - 9472,
http://dx.doi.org/10.1109/JIOT.2020.29965902021
Ashraf J; Keshk M; Moustafa N; Abdel-Basset M; Khurshid H; Bakhshi AD; Mostafa RR, 2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities',
Sustainable Cities and Society, vol. 72, pp. 103041 - 103041,
http://dx.doi.org/10.1016/j.scs.2021.1030412021
Moustafa N, 2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets',
Sustainable Cities and Society, vol. 72, pp. 102994 - 102994,
http://dx.doi.org/10.1016/j.scs.2021.1029942021
Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access
2020
Alsaedi A; Moustafa N; Tari Z; Mahmood A; Adna N Anwar , 2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems',
IEEE Access, vol. 8, pp. 165130 - 165150,
http://dx.doi.org/10.1109/ACCESS.2020.30228622020
Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks',
IEEE Transactions on Industrial Informatics, vol. 16, pp. 5110 - 5118,
http://dx.doi.org/10.1109/TII.2019.29571402020
Haider W; Moustafa N; Keshk M; Fernandez A; Choo KKR; Wahab A, 2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems',
Computers and Security, vol. 96, pp. 101906 - 101906,
http://dx.doi.org/10.1016/j.cose.2020.1019062020
Koroniotis N; Moustafa N; Sitnikova E, 2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems
2020
Ali I; Sallam K; Moustafa N; Chakrabortty R; Ryan M; Choo K-KR, 2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems',
IEEE Transactions on Cloud Computing,
http://dx.doi.org/10.1109/TCC.2020.30323862020
Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions',
IEEE Access, vol. 8, pp. 104893 - 104917,
http://dx.doi.org/10.1109/ACCESS.2020.29997152020
Al-Hawawreh M; Moustafa N; Garg S; Hossain S, 2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
2020
Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things',
Sustainability (Switzerland), vol. 12, pp. 6434 - 6434,
http://dx.doi.org/10.3390/SU121664342020
Asharf J; Moustafa N; Khurshid H; Debie E; Haider W; Wahab A, 2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions',
Electronics (Switzerland), vol. 9, pp. 1177 - 1177,
http://dx.doi.org/10.3390/electronics90711772020
Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
2020
Pratim Ray P; Dash D; Moustafa N, 2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective',
Transactions on Emerging Telecommunications Technologies, vol. 31,
http://dx.doi.org/10.1002/ett.41092020
Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
2019
Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems',
IEEE Transactions on Sustainable Computing, pp. 1 - 1,
http://dx.doi.org/10.1109/tsusc.2019.29066572019
Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog',
IEEE Transactions on Information Forensics and Security,
http://dx.doi.org/10.1109/TIFS.2018.28908082019
Moustafa N, 2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber
Security Systems: A Review of Fog Computing',
,
http://arxiv.org/abs/1906.01055v12019
Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions',
IEEE Access, vol. 7, pp. 61764 - 61785,
http://dx.doi.org/10.1109/ACCESS.2019.29167172019
Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
2019
Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers',
IEEE Access, vol. 7, pp. 114607 - 114618,
http://dx.doi.org/10.1109/ACCESS.2019.29351422019
Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey',
Journal of Network and Computer Applications, vol. 128, pp. 33 - 55,
http://dx.doi.org/10.1016/j.jnca.2018.12.0062019
Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals',
IEEE Transactions on Emerging Topics in Computational Intelligence,
http://dx.doi.org/10.1109/TETCI.2018.28299812018
Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things',
IEEE Internet of Things Journal,
http://dx.doi.org/10.1109/JIOT.2018.28717192018
Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks',
IEEE Transactions on Sustainable Computing,
http://dx.doi.org/10.1109/TSUSC.2018.28084302018
Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models',
Journal of Information Security and Applications, vol. 41, pp. 1 - 11,
http://dx.doi.org/10.1016/j.jisa.2018.05.0022018
Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks',
IEEE Transactions on Big Data,
http://dx.doi.org/10.1109/TBDATA.2017.27151662017
Moustafa N; Slay J, 2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence
Analysis',
RCNF: Real-time Collaborative Network Forensic Scheme for Evidence
Analysis,
http://arxiv.org/abs/1711.02824v12017
Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set',
Information Security Journal, vol. 25, pp. 18 - 31,
http://dx.doi.org/10.1080/19393555.2015.11259742016