default search action
Nour Moustafa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j96]Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems. Ad Hoc Networks 169: 103760 (2025) - [j95]Weiping Ding, Mohamed Abdel-Basset, Ahmed M. Ali, Nour Moustafa:
Large language models for cyber resilience: A comprehensive review, challenges, and future perspectives. Appl. Soft Comput. 170: 112663 (2025) - [j94]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya:
VIFL: vulnerability identification using federated learning in the internet of things systems. Computing 107(1): 8 (2025) - 2024
- [j93]Muna Al-Hawawreh, Nour Moustafa:
Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Networks 153: 103329 (2024) - [j92]Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull:
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems. Cogn. Comput. 16(5): 2626-2641 (2024) - [j91]Monica T. Whitty, Nour Moustafa, Marthie Grobler:
Cybersecurity when working from home during COVID-19: considering the human factors. J. Cybersecur. 10(1) (2024) - [j90]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann:
Feature extraction for machine learning-based intrusion detection in IoT networks. Digit. Commun. Networks 10(1): 205-216 (2024) - [j89]Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Imran Razzak, Mohamed Abd Elfattah:
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach. Digit. Commun. Networks 10(2): 404-415 (2024) - [j88]Wei-Ping Ding, Mohamed Abdel-Basset, Ahmed M. Ali, Nour Moustafa:
A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future. Eng. Appl. Artif. Intell. 138: 109451 (2024) - [j87]Sara Salim, Nour Moustafa, Mohamed Hassanian, David G. A. Ormrod, Jill Slay:
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications. IEEE Internet Things J. 11(3): 3853-3867 (2024) - [j86]Muna Al-Hawawreh, Nour Moustafa, Jill Slay:
A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Comput. Appl. 36(1): 15-35 (2024) - [j85]Waleed Yamany, Marwa Keshk, Nour Moustafa, Benjamin P. Turnbull:
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks. IEEE Trans. Consumer Electron. 70(1): 1359-1369 (2024) - [j84]Nathan Johnson, Benjamin P. Turnbull, Martin Reisslein, Nour Moustafa:
CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification. IEEE Trans. Comput. Soc. Syst. 11(4): 4636-4648 (2024) - [j83]Sara Salim, Benjamin P. Turnbull, Nour Moustafa:
A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks. IEEE Trans. Comput. Soc. Syst. 11(4): 4681-4697 (2024) - [j82]Mohammed Hassanin, Nour Moustafa, Imran Razzak, M. Tanveer, David G. A. Ormrod, Jill Slay:
Dynamic Hypersphere Embedding Scale Against Adversarial Attacks. IEEE Trans. Engineering Management 71: 12475-12486 (2024) - [j81]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 3772-3787 (2024) - [c32]Hasan Geren, Nasrin Sohrabi, Zahir Tari, Nour Moustafa:
A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge. ICDE 2024: 1520-1532 - [c31]Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull:
PEL: Privacy Embedded Learning in Smart Healthcare Systems. PST 2024: 1-10 - [d4]Nour Moustafa, S. Hettich, S. D. Bay, Sebastián García, Agustin Parmisano, María José Erquiaga, Muhammad Dany AlFriki, Cut Alna Fadhilla, Rafael Kaliski:
AIoT Malware detection (Zeek preprocessed). IEEE DataPort, 2024 - [i22]Mohammed Hassanin, Nour Moustafa:
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions. CoRR abs/2405.14487 (2024) - 2023
- [j80]Nour Moustafa, Nickolaos Koroniotis, Marwa Keshk, Albert Y. Zomaya, Zahir Tari:
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions. IEEE Commun. Surv. Tutorials 25(3): 1775-1807 (2023) - [j79]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari:
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 55(9): 191:1-191:43 (2023) - [j78]Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mohammad Saidur Rahman:
Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications. IEEE Internet Things J. 10(4): 2821-2831 (2023) - [j77]Marwa Keshk, Nickolaos Koroniotis, Nam Pham, Nour Moustafa, Benjamin P. Turnbull, Albert Y. Zomaya:
An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 639: 119000 (2023) - [j76]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. J. Netw. Syst. Manag. 31(1): 3 (2023) - [j75]Reda M. Hussien, Amr A. Abohany, Nour Moustafa, Karam M. Sallam:
An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks. Neural Comput. Appl. 35(25): 18665-18680 (2023) - [j74]Theresa May Sobb, Benjamin P. Turnbull, Nour Moustafa:
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities. Sensors 23(17): 7391 (2023) - [j73]Abdullah Alsaedi, Zahir Tari, Md. Redowan Mahmud, Nour Moustafa, Abdun Mahmood, Adnan Anwar:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. IEEE Trans. Dependable Secur. Comput. 20(1): 724-739 (2023) - [j72]Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash:
Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. IEEE Trans. Ind. Informatics 19(1): 995-1005 (2023) - [j71]Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Yasir Hussain, Nauman Ali Khan:
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. IEEE Trans. Ind. Informatics 19(3): 3300-3309 (2023) - [j70]Muhammad Alsherbiny, Ibrahim Radwan, Nour Moustafa, Deep Jyoti Bhuyan, Muath El-Waisi, Dennis Chang, Chunguang Li:
Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations. IEEE J. Biomed. Health Informatics 27(4): 1691-1700 (2023) - [j69]Waleed Yamany, Nour Moustafa, Benjamin P. Turnbull:
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 893-903 (2023) - [j68]Ayodeji Oseni, Nour Moustafa, Gideon Creech, Nasrin Sohrabi, Andrew Strelzoff, Zahir Tari, Igor Linkov:
An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks. IEEE Trans. Intell. Transp. Syst. 24(1): 1000-1014 (2023) - [j67]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports. IEEE Trans. Intell. Transp. Syst. 24(2): 2368-2381 (2023) - [j66]Francesco Schiliro, Nour Moustafa, Imran Razzak, Amin Beheshti:
DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing. IEEE Trans. Intell. Transp. Syst. 24(7): 7485-7493 (2023) - [j65]Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya:
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges. IEEE Trans. Serv. Comput. 16(2): 1485-1504 (2023) - [j64]Yinghai Zhou, Yitong Ren, Ming Yi, Yanjun Xiao, Zhiyuan Tan, Nour Moustafa, Zhihong Tian:
CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships. IEEE Trans. Sustain. Comput. 8(4): 627-638 (2023) - [c30]Hania Mohamed, Nickolaos Koroniotis, Nour Moustafa:
Digital Forensics based on Federated Learning in IoT Environment. ACSW 2023: 92-101 - 2022
- [b2]Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding:
Deep Learning Techniques for IoT Security and Privacy. Studies in Computational Intelligence 997, Springer 2022, ISBN 978-3-030-89024-7, pp. 1-257 - [j63]Md. Asikuzzaman, Hannes Mareen, Nour Moustafa, Kim-Kwang Raymond Choo, Mark R. Pickering:
Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain. IEEE Access 10: 15681-15698 (2022) - [j62]Sara Salim, Benjamin P. Turnbull, Nour Moustafa:
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems. Ad Hoc Networks 128: 102786 (2022) - [j61]Senthil Kumar Jagatheesaperumal, Preeti Mishra, Nour Moustafa, Rahul Chauhan:
A holistic survey on the use of emerging technologies to provision secure healthcare solutions. Comput. Electr. Eng. 99: 107691 (2022) - [j60]Nickolaos Koroniotis, Nour Moustafa, Jill Slay:
A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks. Comput. Electr. Eng. 99: 107745 (2022) - [j59]Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa:
Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions. IEEE Consumer Electron. Mag. 11(6): 56-66 (2022) - [j58]Mohammed Hassanin, Nour Moustafa, Murat Tahtali, Kim-Kwang Raymond Choo:
Rethinking maximum-margin softmax for adversarial robustness. Comput. Secur. 116: 102640 (2022) - [j57]Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT anomaly detection performance for federated learning. Digit. Commun. Networks 8(3): 314-323 (2022) - [j56]Izhar Ahmed Khan, Nour Moustafa, Imran Razzak, Muhammad Tanveer, Dechang Pi, Yue Pan, Bakht Sher Ali:
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. Future Gener. Comput. Syst. 127: 181-193 (2022) - [j55]Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba:
Radial Basis Function Network with Differential Privacy. Future Gener. Comput. Syst. 127: 473-486 (2022) - [j54]Imran Razzak, Nour Moustafa, Shahid Mumtaz, Guangdong Xu:
One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data. Int. J. Intell. Syst. 37(8): 4515-4536 (2022) - [j53]Tim M. Booij, Irina Chiscop, Erik Meeuwissen, Nour Moustafa, Frank T. H. den Hartog:
ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets. IEEE Internet Things J. 9(1): 485-496 (2022) - [j52]Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Nazeeruddin Mohammad:
H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information. IEEE Internet Things J. 9(12): 10010-10021 (2022) - [j51]Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Karam M. Sallam, Albert Y. Zomaya, Bentian Li:
A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks. IEEE Internet Things J. 9(13): 11604-11613 (2022) - [j50]Weiping Ding, Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa:
Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication. Inf. Sci. 597: 144-165 (2022) - [j49]Abdul Qayyum, Imran Razzak, Nour Moustafa, Moona Mazher:
Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children. Image Vis. Comput. 119: 104375 (2022) - [j48]Ismail M. Ali, Karam M. Sallam, Nour Moustafa, Ripon K. Chakrabortty, Michael J. Ryan, Kim-Kwang Raymond Choo:
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems. IEEE Trans. Cloud Comput. 10(4): 2294-2308 (2022) - [j47]Essam Soliman Debie, Nour Moustafa, Athanasios V. Vasilakos:
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network. IEEE Trans. Dependable Secur. Comput. 19(4): 2488-2500 (2022) - [j46]Md Abdur Rahim, Md. Arafatur Rahman, Md. Mustafizur Rahman, Nafees Zaman, Nour Moustafa, Imran Razzak:
An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health. IEEE Trans. Green Commun. Netw. 6(3): 1298-1306 (2022) - [j45]Nour Moustafa, Kim-Kwang Raymond Choo, Adnan M. Abu-Mahfouz:
Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System. IEEE Trans. Ind. Informatics 18(3): 1892-1895 (2022) - [j44]Mohammad Saidur Rahman, Ibrahim Khalil, Nour Moustafa, Aditya Pribadi Kalapaaking, Abdelaziz Bouras:
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems. IEEE Trans. Ind. Informatics 18(7): 5007-5017 (2022) - [j43]Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash:
Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach. IEEE Trans. Ind. Informatics 18(11): 7920-7934 (2022) - [j42]Liu Chang, Jia Wu, Nour Moustafa, Ali Kashif Bashir, Keping Yu:
AI-Driven Synthetic Biology for Non-Small Cell Lung Cancer Drug Effectiveness-Cost Analysis in Intelligent Assisted Medical Systems. IEEE J. Biomed. Health Informatics 26(10): 5055-5066 (2022) - [j41]Mahmuda Akter, Nour Moustafa, Timothy M. Lynar, Imran Razzak:
Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems. IEEE J. Biomed. Health Informatics 26(12): 5805-5816 (2022) - [j40]Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Imran Razzak, Karam M. Sallam, Osama M. Elkomy:
Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(3): 2523-2537 (2022) - [j39]Mohiuddin Ahmed, Nour Moustafa, A. F. M. Suaib Akhter, Imran Razzak, Ehsanuzzaman Surid, Adnan Anwar, A. F. M. Shahen Shah, Ahmet Zengin:
A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Trans. Intell. Transp. Syst. 23(10): 19624-19633 (2022) - [j38]Md. Arafatur Rahman, Md Abdur Rahim, Md. Mustafizur Rahman, Nour Moustafa, Imran Razzak, Tanvir Ahmad, Mohammad N. Patwary:
A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics. IEEE Trans. Intell. Transp. Syst. 23(10): 19727-19742 (2022) - [j37]Md. Arafatur Rahman, Marufa Yasmin Mukta, A. Taufiq Asyhari, Nour Moustafa, Mohammad N. Patwary, Abu Yousuf, Imran Razzak, Brij B. Gupta:
Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management. IEEE Trans. Intell. Transp. Syst. 23(12): 23771-23780 (2022) - [j36]Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Waqas Haider, Bentian Li, Alireza Jolfaei:
An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 25469-25478 (2022) - [j35]Sara Salim, Nour Moustafa, Benjamin P. Turnbull, Imran Razzak:
Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks. ACM Trans. Multim. Comput. Commun. Appl. 18(2s): 120:1-120:19 (2022) - [j34]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Privacy-preserving big data analytics for cyber-physical systems. Wirel. Networks 28(3): 1241-1249 (2022) - [c29]Mahmuda Akter, Nour Moustafa, Timothy M. Lynar:
Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems. INFOCOM Workshops 2022: 1-8 - [d3]Nathan Johnson, Benjamin P. Turnbull, Martin Reisslein, Nour Moustafa:
ASU/UNSW-CNATCC-001. IEEE DataPort, 2022 - 2021
- [j33]Marwa Keshk, Benjamin P. Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa:
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems. IEEE Access 9: 55077-55097 (2021) - [j32]Mohamed Abdel-Basset, Abduallah Gamal, Nour Moustafa, Ahmed Abdel-Monem, Nissreen A. S. El-Saber:
A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles. IEEE Access 9: 107657-107679 (2021) - [j31]Dilini Samarasinghe, Michael Barlow, Erandi Lakshika, Timothy M. Lynar, Nour Moustafa, Thomas Townsend, Benjamin P. Turnbull:
A Data Driven Review of Board Game Design and Interactions of Their Mechanics. IEEE Access 9: 114051-114069 (2021) - [j30]Mohamed Abdel-Basset, Nour Moustafa, Reda Mohamed, Osama M. Elkomy, Mohamed Abouhawwash:
Multi-Objective Task Scheduling Approach for Fog Computing. IEEE Access 9: 126988-127009 (2021) - [j29]Mohammed Hassanin, Ibrahim Radwan, Nour Moustafa, Murat Tahtali, Neeraj Kumar:
Mitigating the impact of adversarial attacks in very deep networks. Appl. Soft Comput. 105: 107231 (2021) - [j28]Nour Moustafa, Marwa Keshk, Kim-Kwang Raymond Choo, Timothy M. Lynar, Seyit Camtepe, Monica T. Whitty:
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks. Future Gener. Comput. Syst. 118: 240-251 (2021) - [j27]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12): 9463-9472 (2021) - [j26]Shu Li, Wei Shen, Muhammad Bilal, Xiaolong Xu, Wanchun Dou, Nour Moustafa:
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing. J. Syst. Archit. 119: 102273 (2021) - [j25]Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Osama M. Elkomy:
Two-Stage Deep Learning Framework for Discrimination between COVID-19 and Community-Acquired Pneumonia from Chest CT scans. Pattern Recognit. Lett. 152: 311-319 (2021) - [j24]Javed Ashraf, Asim D. Bakhshi, Nour Moustafa, Hasnat Khurshid, Abdullah Javed, Amin Beheshti:
Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 22(7): 4507-4518 (2021) - [j23]Muna Al-Hawawreh, Nour Moustafa, Sahil Garg, M. Shamim Hossain:
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 2968-2981 (2021) - [j22]Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil:
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems. IEEE Trans. Sustain. Comput. 6(1): 66-79 (2021) - [j21]Nour Moustafa, Gaurav Misra, Jill Slay:
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks. IEEE Trans. Sustain. Comput. 6(2): 245-256 (2021) - [c28]Javed Ashraf, Nour Moustafa, Asim D. Bakhshi, Abdullah Javed:
Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques. EDOC Workshops 2021: 46-52 - [c27]Shiyi Yang, Hui Guo, Nour Moustafa:
Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network. QRS 2021: 829-840 - [c26]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. TrustCom 2021: 887-894 - [i21]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
Towards a Standard Feature Set of NIDS Datasets. CoRR abs/2101.11315 (2021) - [i20]Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios V. Vasilakos:
Security and Privacy for Artificial Intelligence: Opportunities and Challenges. CoRR abs/2102.04661 (2021) - [i19]Shiyi Yang, Peilun Wu, Hui Guo, Nour Moustafa:
Hunter in the Dark: Discover Anomalous Network Activities Using Deep Ensemble Networks. CoRR abs/2105.09157 (2021) - [i18]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann:
Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks. CoRR abs/2108.12722 (2021) - [i17]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. CoRR abs/2109.09259 (2021) - [i16]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection. CoRR abs/2111.02791 (2021) - 2020
- [j20]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull:
A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access 8: 104893-104917 (2020) - [j19]Abdullah Alsaedi, Nour Moustafa, Zahir Tari, Abdun Naser Mahmood, Adnan Anwar:
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 8: 165130-165150 (2020) - [j18]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 8: 209802-209834 (2020) - [j17]Waqas Haider, Nour Moustafa, Marwa Keshk, Amanda S. Fernandez, Kim-Kwang Raymond Choo, Abdul Wahab:
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Comput. Secur. 96: 101906 (2020) - [j16]Partha Pratim Ray, Dinesh Dash, Nour Moustafa:
Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective. Trans. Emerg. Telecommun. Technol. 31(11) (2020) - [j15]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova:
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Future Gener. Comput. Syst. 110: 91-106 (2020) - [j14]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. IEEE Trans. Inf. Forensics Secur. 15: 1164-1174 (2020) - [j13]Marwa Keshk, Benjamin P. Turnbull, Nour Moustafa, Dinusha Vatsalan, Kim-Kwang Raymond Choo:
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Trans. Ind. Informatics 16(8): 5110-5118 (2020) - [c25]Waleed Yamany, Nour Moustafa, Benjamin P. Turnbull:
A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems. Australasian Conference on Artificial Intelligence 2020: 94-109 - [c24]Francesco Schiliro, Nour Moustafa, Amin Beheshti:
Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things. DependSys 2020: 73-79 - [c23]Peilun Wu, Hui Guo, Nour Moustafa:
Pelican: A Deep Residual Network for Network Intrusion Detection. DSN Workshops 2020: 55-62 - [c22]Essam Soliman Debie, Nour Moustafa, Monica T. Whitty:
A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals. IJCNN 2020: 1-8 - [c21]Francesco Schiliro, Amin Beheshti, Nour Moustafa:
A Novel Cognitive Computing Technique Using Convolutional Networks for Automating the Criminal Investigation Process in Policing. IntelliSys (1) 2020: 528-539 - [c20]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull:
A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks. IntelliSys (1) 2020: 553-565 - [c19]Nour Moustafa, Alireza Jolfaei:
Autonomous detection of malicious events using machine learning models in drone networks. DroneCom@MobiCom 2020: 61-66 - [c18]Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT Anomaly Detection Performance for Federated Learning. MSN 2020: 206-213 - [c17]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull, Dinusha Vatsalan:
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems. MSN 2020: 711-717 - [c16]Mohammed Hassanin, Nour Moustafa, Murat Tahtali:
A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models. SSCI 2020: 1499-1505 - [c15]Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo:
Densely Connected Residual Network for Attack Recognition. TrustCom 2020: 233-242 - [c14]Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. TrustCom 2020: 727-735 - [c13]Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. TrustCom 2020: 848-855 - [c12]Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. TrustCom 2020: 856-863 - [c11]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. BDTA/WiCON 2020: 117-135 - [e1]Marcus Gallagher, Nour Moustafa, Erandi Lakshika:
AI 2020: Advances in Artificial Intelligence - 33rd Australasian Joint Conference, AI 2020, Canberra, ACT, Australia, November 29-30, 2020, Proceedings. Lecture Notes in Computer Science 12576, Springer 2020, ISBN 978-3-030-64983-8 [contents] - [i15]Nickolaos Koroniotis, Nour Moustafa:
Enhancing network forensics with particle swarm and deep learning: The particle deep framework. CoRR abs/2005.00722 (2020) - [i14]Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo:
Densely Connected Residual Network for Attack Recognition. CoRR abs/2008.02196 (2020) - [i13]Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. CoRR abs/2010.08521 (2020) - [i12]Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. CoRR abs/2010.08522 (2020) - [i11]Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2011.09144 (2020) - [i10]Mohammed Hassanin, Nour Moustafa, Murat Tahtali:
A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models. CoRR abs/2012.04734 (2020) - [i9]Mohammed Hassanin, Ibrahim Radwan, Nour Moustafa, Murat Tahtali, Neeraj Kumar:
Mitigating the Impact of Adversarial Attacks in Very Deep Networks. CoRR abs/2012.04750 (2020)
2010 – 2019
- 2019
- [j12]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova:
Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions. IEEE Access 7: 61764-61785 (2019) - [j11]Ibrahim Radwan, Nour Moustafa, Byron W. Keating, Kim-Kwang Raymond Choo, Roland Goecke:
Hierarchical Adversarial Network for Human Pose Estimation. IEEE Access 7: 103619-103628 (2019) - [j10]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers. IEEE Access 7: 114607-114618 (2019) - [j9]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100: 779-796 (2019) - [j8]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 6(3): 4815-4830 (2019) - [j7]Nour Moustafa, Jiankun Hu, Jill Slay:
A holistic review of Network Anomaly Detection Systems: A comprehensive survey. J. Netw. Comput. Appl. 128: 33-55 (2019) - [j6]Nour Moustafa, Jill Slay, Gideon Creech:
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks. IEEE Trans. Big Data 5(4): 481-494 (2019) - [j5]Nour Moustafa, Kim-Kwang Raymond Choo, Ibrahim Radwan, Seyit Camtepe:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. IEEE Trans. Inf. Forensics Secur. 14(8): 1975-1987 (2019) - [d2]Nour Moustafa:
The Bot-IoT dataset. IEEE DataPort, 2019 - [d1]Nour Moustafa:
UNSW_NB15 dataset. IEEE DataPort, 2019 - [i8]Nour Moustafa:
A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing. CoRR abs/1906.01055 (2019) - 2018
- [j4]Nour Moustafa, Erwin Adi, Benjamin P. Turnbull, Jiankun Hu:
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access 6: 32910-32924 (2018) - [j3]Muna Al-Hawawreh, Nour Moustafa, Elena Sitnikova:
Identification of malicious activities in industrial internet of things based on deep learning models. J. Inf. Secur. Appl. 41: 1-11 (2018) - [j2]Min Wang, Sherif M. Abdelfattah, Nour Moustafa, Jiankun Hu:
Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals. IEEE Trans. Emerg. Top. Comput. Intell. 2(4): 278-287 (2018) - [c10]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks. ICII 2018: 139-145 - [c9]Nour Moustafa, Jill Slay:
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection. IFIP Int. Conf. Digital Forensics 2018: 225-239 - [c8]Stephen Wilson, Nour Moustafa, Elena Sitnikova:
A digital identity stack to improve privacy in the IoT. WF-IoT 2018: 25-29 - [i7]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset. CoRR abs/1811.00701 (2018) - 2017
- [b1]Nour Moustafa:
Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic. University of New South Wales, Canberra, Australia, 2017 - [c7]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Gideon Creech:
Privacy preservation intrusion detection technique for SCADA systems. MilCIS 2017: 1-6 - [c6]Nour Moustafa, Gideon Creech, Elena Sitnikova, Marwa Keshk:
Collaborative anomaly detection framework for handling big data of cloud computing. MilCIS 2017: 1-6 - [c5]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay:
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques. MONAMI 2017: 30-44 - [c4]Waqas Haider, Jiankun Hu, Nour Moustafa:
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning. MONAMI 2017: 137-149 - [c3]Thomas Marsden, Nour Moustafa, Elena Sitnikova, Gideon Creech:
Probability Risk Identification Based Intrusion Detection System for SCADA Systems. MONAMI 2017: 353-363 - [i6]Nour Moustafa, Jill Slay:
A hybrid feature selection for network intrusion detection systems: Central points. CoRR abs/1707.05505 (2017) - [i5]Nour Moustafa, Jill Slay:
RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis. CoRR abs/1711.02824 (2017) - [i4]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay:
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques. CoRR abs/1711.02825 (2017) - [i3]Thomas Marsden, Nour Moustafa, Elena Sitnikova, Gideon Creech:
Probability Risk Identification Based Intrusion Detection System for SCADA Systems. CoRR abs/1711.02826 (2017) - [i2]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Gideon Creech:
Privacy Preservation Intrusion Detection Technique for SCADA Systems. CoRR abs/1711.02828 (2017) - [i1]Nour Moustafa, Gideon Creech, Elena Sitnikova, Marwa Keshk:
Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing. CoRR abs/1711.02829 (2017) - 2016
- [j1]Nour Moustafa, Jill Slay:
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Glob. Perspect. 25(1-3): 18-31 (2016) - 2015
- [c2]Nour Moustafa, Jill Slay:
The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. BADGERS@RAID 2015: 25-31 - [c1]Nour Moustafa, Jill Slay:
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). MilCIS 2015: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint