Follow
Ashawa Moses
Title
Cited by
Cited by
Year
Analysis of android malware detection techniques: a systematic review
MA Ashawa, S Morris
Society of Digital Information and Wireless Communications, 2019
302019
Effective methods to detect metamorphic malware: a systematic review
M Irshad, HM Al-Khateeb, A Mansour, M Ashawa, M Hamisu
International Journal of Electronic Security and Digital Forensics 10 (2 …, 2018
232018
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm
M Ashawa, O Douglas, J Osamor, R Jackie
Journal of Cloud Computing 11 (1), 87, 2022
212022
Analysis of mobile malware: a systematic review of evolution and infection strategies
M Ashawa, S Morris
جامعة نايف العربية للعلوم الأمنية, 2021
132021
Forensic data extraction and analysis of left artifacts on emulated android phones: a case study of instant messaging applications
M Ashawa, I Ogwuche
Seizure 19, 16, 2017
112017
Android permission classifier: a deep learning algorithmic framework based on protection and threat levels
M Ashawa, S Morris
Security and Privacy 4 (5), e164, 2021
72021
Vulnerability Assessment and Evaluation of Associated Attacks on Physical and Virtual Networks.
M Ashawa
IUP Journal of Computer Sciences 12 (2), 2018
72018
Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis
M Ashawa, S Morris
Journal of Cybersecurity and Privacy 1 (4), 704-742, 2021
62021
Host-based detection and analysis of android malware: Implication for privilege exploitation
M Ashawa, S Morris
prevalence 8 (9), 10-11, 2019
62019
Investigating Google Chrome 66.0. 3359 artefact: internet forensics approach
N Morris, A Moses
International Journal of Computer Science and Mobile Computing 7, 112-122, 2018
42018
Enhancing credit card fraud detection: an ensemble machine learning approach
AR Khalid, N Owoh, O Uthmani, M Ashawa, J Osamor, J Adejoh
Big Data and Cognitive Computing 8 (1), 6, 2024
32024
Analysis of mobile malware, evolution and infection strategies: A systematic review
M Ashawa, S Morris
NAUSS, 2021
22021
Examining artifacts generated by setting Facebook Messenger as a default SMS application on Android: Implication for personal data privacy
M Ntonja, M Ashawa
Security and Privacy 3 (6), e128, 2020
22020
Design and implementation of Linux based workflow for digital forensics investigation
MA Ashawa, M Ntonja
Foundation of Computer Science, 2019
22019
An Adaptive Temporal Convolutional Network Autoencoder for Malicious Data Detection in Mobile Crowd Sensing
N Owoh, J Riley, M Ashawa, S Hosseinzadeh, A Philip, J Osamor
Sensors 24 (7), 2353, 2024
2024
An Exploration of shared code execution for malware analysis
M Ashawa, NP Owoh, J Riley, J Osamor, S Hosseinzadeh
2024 International Conference on Artificial Intelligence, Computer, Data …, 2024
2024
Explainable Machine Learning for LoRaWAN Link Budget Analysis and Modeling
S Hosseinzadeh, M Ashawa, N Owoh, H Larijani, K Curtis
Sensors 24 (3), 860, 2024
2024
Explainable Machine Learning for LoRaWAN Link Budget Analysis and Modeling
HLKC Salaheddin Hosseinzadeh , Moses Ashawa, Nsikak Owoh
sensors, 1-14, 2024
2024
Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation
M Ashawa, A Mansour, J Riley, J Osamor, NP Owoh
Cloud Computing and Data Science, 140-156, 2024
2024
Penetration Testing: Analysis of Emerging Technologies and Their Impact on Pen Testing
M Ashawa, SJ Kpelai
Int J Eng Tech & Inf 4 (4), 1-4, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20