Detection of advanced persistent threat using machine-learning correlation analysis I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ... Future Generation Computer Systems 89, 349-359, 2018 | 277 | 2018 |
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi, T Baker, M Hammoudeh, ... Sensors 19 (8), 1788, 2019 | 264 | 2019 |
Security threats to critical infrastructure: the human factor I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ... The Journal of Supercomputing, 1-17, 2018 | 241 | 2018 |
A survey on network security monitoring systems I Ghafir, V Prenosil, J Svoboda, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 123 | 2016 |
Social engineering attack strategies and defence approaches I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 121 | 2016 |
Advanced persistent threat attack detection: An overview I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security (IJCNS), 2014 | 101 | 2014 |
BotDet: A system for real time botnet command and control traffic detection I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf IEEE Access 6, 38947-38958, 2018 | 83 | 2018 |
Network monitoring approaches: An overview J Svoboda, I Ghafir, V Prenosil International Journal of Advances in Computer Networks and Its Security …, 2015 | 82 | 2015 |
Hidden Markov models and alert correlations for the prediction of advanced persistent threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 72 | 2019 |
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza Proceedings of the International Conference on Future Networks and …, 2017 | 57 | 2017 |
Blacklist-based malicious ip traffic detection I Ghafir, V Prenosil 2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015 | 56 | 2015 |
Proposed approach for targeted attacks detection I Ghafir, V Prenosil Advanced Computer and Communication Engineering Technology, 73-80, 2016 | 55 | 2016 |
Tor-based malware and Tor connection detection I Ghafir, J Svoboda, V Prenosil IET Digital Library, 2014 | 48 | 2014 |
A survey on botnet command and control traffic detection I Ghafir, J Svoboda, V Prenosil International Journal of Advances in Computer Networks and its security …, 2015 | 45 | 2015 |
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ... Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 43 | 2018 |
DNS traffic analysis for malicious domains detection I Ghafir, V Prenosil 2015 2nd International Conference on Signal Processing and Integrated …, 2015 | 41 | 2015 |
Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution I Ghafir, V Prenosil, M Hammoudeh theIRED, 2016 | 40 | 2016 |
Malicious file hash detection and drive-by download attacks I Ghafir, V Prenosil Proceedings of the Second International Conference on Computer and …, 2016 | 40 | 2016 |
Anomaly Detection Using Dynamic Time Warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 38 | 2019 |
Multi-stage attack detection using contextual information FJ Aparicio-Navarro, KG Kyriakopoulos, I Ghafir, S Lambotharan, ... MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018 | 36 | 2018 |