Skip navigation
Skip navigation

Browsing by Author Alazab, Mamoun

Or enter first few letters:  
Showing results 1 to 20 of 29

A Hybrid Wrapper-Filter Approach for Malware Detection

Author(s)Alazab, Mamoun; Huda, Shamsul; Abawajy, Jemal, et al
TypeJournal article
Date Published2014
Date Created-

Analysis of firewall log-based detection scenarios for evidence in digital forensics

Author(s)Mukhtar, R; Al-Nemrat, A; Alazab, Mamoun, et al
TypeJournal article
Date Published2012
Date Created-

Analysis of malicious and benign android applications

Author(s)Alazab, Mamoun; Moonsamy, V.; Batten, L., et al
TypeConference paper
Date Published2012
Date CreatedJune 18-21 2012

Cybercrime in Australian Cyberspace: Evidence Based Results from Known Victims

Author(s)Broadhurst, Roderic; Alazab, Mamoun; Chon, Ki Hong
TypeConference paper
Date Published2012
Date CreatedOctober 3-5 2012

Cybercrime: The Case of Obfuscated Malware

Author(s)Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul Andrew, et al
TypeJournal article
Date Published2012
Date Created-

Detecting malicious behaviour using supervised learning algorithms of the function calls

Author(s)Alazab, Mamoun; Venkatraman, Sitalakshmi
TypeJournal article
Date Published2013
Date Created-

Fast authentication in wireless sensor networks

Author(s)Benzaid, Chafika; Lounis, Karim; Al-Nemrat, A, et al
TypeJournal article
Date Published2016
Date Created-

GOM: New Genetic Optimizing Model for broadcasting tree in MANET

Author(s)Elaiwat, Said; Alazab, Ammar; Venkatraman, Sitalakshmi, et al
TypeConference paper
Date Published2010
Date CreatedNovember 2-4 2010

Hybrids of Support Vector Machine wrapper and Filter based frameworks for Malware detection using API call statistics

Author(s)Huda, Shamsul; Abawajy, Jemal; Alazab, Mamoun, et al
TypeJournal article
Date Published2014
Date Created-

Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs

Author(s)Amuchi, Faith; Al-Nemrat, A; Alazab, Mamoun, et al
TypeConference paper
Date Published2013
Date CreatedOctober 29-30 2012

Information Security Governance: The Art of Detecting Hidden Malware

Author(s)Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul, et al
TypeBook chapter
Date Published2013
Date Created-

Malicious Code Detection Using Penalized Splines on OPcode Frequency

Author(s)Alazab, Mamoun; Kadiri, Mohammad; Venkatraman, S, et al
TypeConference paper
Date Published2013
Date CreatedOctober 29-30 2012

Malicious Spam Emails Developments and Authorship Attribution

Author(s)Alazab, Mamoun; Layton, Robert; Broadhurst, Roderic, et al
TypeConference paper
Date Published2013
Date CreatedNovember 2013

Mining Malware To Detect Variants

Author(s)Azab, Ahmad; Layton, Robert; Alazab, Mamoun, et al
TypeConference paper
Date Published2015
Date CreatedNovember 24-25 2014

Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan

Author(s)Alhyar, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al
TypeJournal article
Date Published2013
Date Created-

Profiling and classifying the behavior of malicious codes

Author(s)Alazab, Mamoun
TypeJournal article
Date Published2014
Date Created-

Quality Approaches for Performance Measurement in Jordanian E-Government Services

Author(s)Venkatraman, Sitalakshmi; Alazab, Mamoun
TypeBook chapter
Date Published2014
Date Created-

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Author(s)Alhyari, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al
TypeJournal article
Date Published2012
Date Created-

Skype Traffic Classification Using Cost Sensitive Algorithms

Author(s)Azab, Ahmad; Layton, Robert; Alazab, Mamoun, et al
TypeConference paper
Date Published2013
Date CreatedNovember 2013

Smartphone Malware based on synchronization Vulnerabilities

Author(s)Alazab, Mamoun; Alazab, Ammar; Batten, L.
TypeConference paper
Date Published2011
Date CreatedNovember 21-24 2011

Updated:  12 April 2016/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator