Browsing by Author Alazab, Mamoun
Showing results 3 to 22 of 28
Cybercrime in Australian Cyberspace: Evidence Based Results from Known Victims
Author(s) | Broadhurst, Roderic; Alazab, Mamoun; Chon, Ki Hong |
---|---|
Type | Conference paper |
Date Published | 2012 |
Date Created | October 3-5 2012 |
Cybercrime: The Case of Obfuscated Malware
Author(s) | Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul Andrew, et al |
---|---|
Type | Journal article |
Date Published | 2012 |
Date Created | - |
Detecting malicious behaviour using supervised learning algorithms of the function calls
Author(s) | Alazab, Mamoun; Venkatraman, Sitalakshmi |
---|---|
Type | Journal article |
Date Published | 2013 |
Date Created | - |
Fast authentication in wireless sensor networks
Author(s) | Benzaid, Chafika; Lounis, Karim; Al-Nemrat, A, et al |
---|---|
Type | Journal article |
Date Published | 2016 |
Date Created | - |
GOM: New Genetic Optimizing Model for broadcasting tree in MANET
Author(s) | Elaiwat, Said; Alazab, Ammar; Venkatraman, Sitalakshmi, et al |
---|---|
Type | Conference paper |
Date Published | 2010 |
Date Created | November 2-4 2010 |
Hybrids of Support Vector Machine wrapper and Filter based frameworks for Malware detection using API call statistics
Author(s) | Huda, Shamsul; Abawajy, Jemal; Alazab, Mamoun, et al |
---|---|
Type | Journal article |
Date Published | 2014 |
Date Created | - |
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
Author(s) | Amuchi, Faith; Al-Nemrat, A; Alazab, Mamoun, et al |
---|---|
Type | Conference paper |
Date Published | 2013 |
Date Created | October 29-30 2012 |
Information Security Governance: The Art of Detecting Hidden Malware
Author(s) | Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul, et al |
---|---|
Type | Book chapter |
Date Published | 2013 |
Date Created | - |
Malicious Code Detection Using Penalized Splines on OPcode Frequency
Author(s) | Alazab, Mamoun; Kadiri, Mohammad; Venkatraman, S, et al |
---|---|
Type | Conference paper |
Date Published | 2013 |
Date Created | October 29-30 2012 |
Malicious Spam Emails Developments and Authorship Attribution
Author(s) | Alazab, Mamoun; Layton, Robert; Broadhurst, Roderic, et al |
---|---|
Type | Conference paper |
Date Published | 2013 |
Date Created | November 2013 |
Mining Malware To Detect Variants
Author(s) | Azab, Ahmad; Layton, Robert; Alazab, Mamoun, et al |
---|---|
Type | Conference paper |
Date Published | 2015 |
Date Created | November 24-25 2014 |
Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan
Author(s) | Alhyar, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al |
---|---|
Type | Journal article |
Date Published | 2013 |
Date Created | - |
Profiling and classifying the behavior of malicious codes
Author(s) | Alazab, Mamoun |
---|---|
Type | Journal article |
Date Published | 2014 |
Date Created | - |
Quality Approaches for Performance Measurement in Jordanian E-Government Services
Author(s) | Venkatraman, Sitalakshmi; Alazab, Mamoun |
---|---|
Type | Book chapter |
Date Published | 2014 |
Date Created | - |
Six sigma approach to improve quality in e-services: An empirical study in Jordan
Author(s) | Alhyari, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al |
---|---|
Type | Journal article |
Date Published | 2012 |
Date Created | - |
Skype Traffic Classification Using Cost Sensitive Algorithms
Author(s) | Azab, Ahmad; Layton, Robert; Alazab, Mamoun, et al |
---|---|
Type | Conference paper |
Date Published | 2013 |
Date Created | November 2013 |
Smartphone Malware based on synchronization Vulnerabilities
Author(s) | Alazab, Mamoun; Alazab, Ammar; Batten, L. |
---|---|
Type | Conference paper |
Date Published | 2011 |
Date Created | November 21-24 2011 |
Spam and crime
Author(s) | Broadhurst, Roderic; Alazab, Mamoun |
---|---|
Type | Book chapter |
Date Published | 2017 |
Date Created | - |
Stochastic model based approach for biometric identification
Author(s) | Islam, Mofakharul; Venkataraman, Sitalakshimi; Alazab, Mamoun |
---|---|
Type | Conference paper |
Date Published | 2010 |
Date Created | December 4-12 2009 |
Towards an understanding of the impact of advertising on data leaks
Author(s) | Moonsamy, V.; Alazab, Mamoun; Batten, L. |
---|---|
Type | Journal article |
Date Published | 2012 |
Date Created | - |
Updated: 12 April 2016/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator