| Deep learning approach for intelligent intrusion detection system R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ... IEEE access 7, 41525-41550, 2019 | 2239 | 2019 |
| Variance ranking attributes selection techniques for binary classification problem in imbalance data SH Ebenuwa, MS Sharif, M Alazab, A Al-Nemrat IEEE access 7, 24649-24666, 2019 | 140 | 2019 |
| Cybercrime classification and characteristics H Jahankhani, A Al-Nemrat, A Hosseinian-Far Cyber crime and cyber terrorism investigator's handbook, 149-164, 2014 | 140 | 2014 |
| A dynamic access control model using authorising workflow and task-role-based access control M Uddin, S Islam, A Al-Nemrat Ieee Access 7, 166676-166689, 2019 | 130 | 2019 |
| Cyber crime and cyber terrorism investigator's handbook B Akhgar, A Staniforth, F Bosco Syngress, 2014 | 103 | 2014 |
| Fast authentication in wireless sensor networks C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab Future Generation Computer Systems 55, 362-375, 2016 | 94 | 2016 |
| Analysing Human Factors for an Effective Information Security Management System R Alavi, S Islam, H Jahankhani, A Al-Nemrat International Journal of Security Software Engineering (IJSSE), Special …, 2012 | 39 | 2012 |
| Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities N Sarantinos, C Benzaid, O Arabiat, A Al-Nemrat 2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016 | 38 | 2016 |
| An Analysis of Honeypot Programs and the Attack Data Collected C Moore, A Al-Nemrat Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 32 | 2015 |
| Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs F Amuchie, A Al-Nemrat, M Alazab, R Layton IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney …, 2012 | 30 | 2012 |
| Examination of cyber-criminal behaviour H Jahankhani, A Al-Nemrat International Journal of Information Science and Management (IJISM), 41-48, 2012 | 24 | 2012 |
| Intelligent detection of MAC spoofing attack in 802.11 network C Benzaïd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 23 | 2016 |
| Sustainability in information systems auditing AABLA Rahman, A Al-Nemrat, DS Preston European Scientific Journal, 2014 | 23 | 2014 |
| Sufficiency of windows event log as evidence in digital forensics NM Ibrahim, A Al-Nemrat, H Jahankhani, R Bashroush International Conference on e-Democracy, 253-262, 2011 | 20 | 2011 |
| ARP Cache Poisoning Mitigation and Forensics Investigation AH Mangut, A Al-Nemrat, A Benzaid, Chafika, Tawil The 14th IEEE International Conference on Trust, Security and Privacy in …, 2015 | 19 | 2015 |
| Cybercrime Victimisations/Criminalisation and Punishment A Al-Nemrat, H Jahankhani, DS Preston Global Security, Safety, and Sustainability 92 (1), 55-62, 2010 | 19 | 2010 |
| The impact of GDPR infringement fines on the market value of firms A Ford, A Al-Nemrat, SA Ghorashi, J Davidson Information & Computer Security 31 (1), 51-64, 2023 | 18 | 2023 |
| Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation EI Edem, C Benzaïd, A Al-Nemrat, P Watters 2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014 | 17 | 2014 |
| Cybercrime profiling and trend analysis H Jahankhani, A Al-Nemrat Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism …, 2011 | 16 | 2011 |
| Securing Address Registration in Location/ID Split Protocol using ID-Based Cryptography M Aiash, A Al-Nemrat, D Preston The 11th International Conference on Wired/Wireless Internet Communications …, 2013 | 13* | 2013 |