Phishing environments, techniques, and countermeasures: A survey A Aleroud, L Zhou Computers & Security 68, 160-196, 2017 | 373 | 2017 |
Bypassing detection of URL-based phishing attacks using generative adversarial deep neural networks A AlEroud, G Karabatis Proceedings of the sixth international workshop on security and privacy …, 2020 | 88 | 2020 |
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach A AlEroud, I Alsmadi Journal of Network and Computer Applications 80, 152-164, 2017 | 88 | 2017 |
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks A AlEroud, G Karabatis ASE/IEEE International Conference on Cyber Security (CyberSec'12), 40-45, 2012 | 59 | 2012 |
An efficient activity recognition framework: Toward privacy-sensitive health data sensing S Samarah, MG Al Zamil, AF Aleroud, M Rawashdeh, MF Alhamid, ... IEEE Access 5, 3848-3859, 2017 | 53 | 2017 |
Automatic bug triage in software systems using graph neighborhood relations for feature augmentation I Alazzam, A Aleroud, Z Al Latifah, G Karabatis IEEE Transactions on Computational Social Systems 7 (5), 1288-1303, 2020 | 47 | 2020 |
Contextual information fusion for intrusion detection: a survey and taxonomy A Aleroud, G Karabatis Knowledge and Information Systems 52, 563-619, 2017 | 47 | 2017 |
Toward zero-day attack identification using linear data transformation techniques A Aleroud, G Karabatis 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 37 | 2013 |
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities A Aleroud, E Abu-Shanab, A Al-Aiad, Y Alshboul Journal of Information Security and Applications 55, 102614, 2020 | 34 | 2020 |
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach AF AlEroud, G Karabatis IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1 - 17, 2016 | 31 | 2016 |
Identifying DoS attacks on software defined networks: A relation context approach A Aleroud, I Alsmadi NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 853-857, 2016 | 29 | 2016 |
Evaluating Google queries based on language preferences AF Al-Eroud, MA Al-Ramahi, MN Al-Kabi, IM Alsmadi, EM Al-Shawakfa Journal of Information Science 37 (3), 282-292, 2011 | 29 | 2011 |
A system for cyber attack detection using contextual semantics A AlEroud, G Karabatis 7th international conference on knowledge management in organizations …, 2013 | 24 | 2013 |
Context infusion in semantic link networks to detect cyber-attacks: a flow-based detection approach A Aleroud, G Karabatis 2014 IEEE International Conference on Semantic Computing, 175-182, 2014 | 22 | 2014 |
Context and semantics for detection of cyber attacks A Aleroud, G Karabatis, P Sharma, P He International Journal of Information and Computer Security 7 6 (1), 63-92, 2014 | 22 | 2014 |
Sdn-gan: generative adversarial deep nns for synthesizing cyber attacks on software defined networks A AlEroud, G Karabatis On the Move to Meaningful Internet Systems: OTM 2019 Workshops: Confederated …, 2020 | 19 | 2020 |
Information fusion for cyber-security analytics IM Alsmadi, G Karabatis, A Aleroud Springer International Publishing, 2017 | 18 | 2017 |
Flow-based system and method for detecting cyber-attacks utilizing contextual information G Karabatis, A Aleroud US Patent App. 14/573,796, 2015 | 18 | 2015 |
Multi-granular aggregation of network flows for security analysis T Ding, A AlEroud, G Karabatis 2015 IEEE international conference on intelligence and security informatics …, 2015 | 16 | 2015 |
Practical information security I Alsmadi, R Burdwell, A Aleroud, A Wahbeh, MA Al-Qudah, A Al-Omari Cham: Springer 78 (3), 2018 | 15 | 2018 |