Mamoun Alazab

Mamoun Alazab
Charles Darwin University | CDU

PhD, Senior Member of IEEE

About

303
Publications
207,855
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,518
Citations

Publications

Publications (303)
Article
Malware is a major security threat confronting computer systems and networks and has increased in scale and impact from the early days of ICT. Traditional protection mechanisms are largely incapable of dealing with the diversity and volume of malware variants which is evident today. This paper examines the evolution of malware including the nature...
Conference Paper
Full-text available
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus industry are faci...
Conference Paper
Full-text available
Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper, w...
Article
Full-text available
This paper explores the nature of groups engaged in cybercrime. It briefly outlines the definition and scope of cybercrime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups (OCG). We give examples of known cases that illustrate individual and group behaviour, and m...
Research
Full-text available
Forensic analysis of the Windows NT File System (NTFS) could provide useful information leading towards malware detection and presentation of digital evidence for the court of law. Since NTFS records every event of the system, forensic tools are required to process an enormous amount of information related to user / kernel environment, buffer overf...
Article
Full-text available
Cloud computing has brought the accessibility of several software platforms under a single roof. It has transformed resources into scalable services on demand and provides the only solution to the high resource requirements. All cloud service providers usually offer all types of services in the cloud computing environment, even though they also han...
Book
Full-text available
Edited Book: BLOCKCHAIN FOR CYBERSECURITY IN CYBER-PHYSICAL SYSTEMS, by Springer Series Advances in Information Security (Scopus) Call for Chapter Submission (Extended firm): September 20, 2022 Call for Chapters: https://sites.google.com/view/blockcyber Submission link: https://easychair.org/conferences/?conf=blockcyber-2022
Article
Full-text available
The papers in this special section focus on security and privacy issues associated with Industry 4.0. In 2011, a group of delegates from business and academia, and politics in German initially proposed the conception of the Fourth Industrial Revolution (or Industry 4.0), which aims to improve the competitive ability in the manufacturing industry of...
Article
Full-text available
The rapid development of the Internet and smart devices trigger surge in network traffic making its infrastructure more complex and heterogeneous. The predominated usage of mobile phones, wearable devices and autonomous vehicles are examples of distributed networks which generate huge amount of data each and every day. The computational power of th...
Article
Multi-access edge computing (MEC) and ultra-dense networking (UDN) are recognized as two promising paradigms for future mobile networks that can be utilized to improve the spectrum efficiency and the quality of computational experience (QoCE) . In this paper, we study the task offloading problem in an MEC-enabled UDN architecture with the aim to mi...
Article
Recent security attack reports show that the number of malware attacks is gradually growing over the years due to the rapid adoption of smart healthcare systems. The development of a safe and secure smart healthcare system is considered to be important from a security point of view. Malware detection is an essential subsystem in healthcare ecosyste...
Article
Full-text available
A literature survey shows that the number of malware attacks is gradually growing over the years due to the growing trend of Internet of Medical Things (IoMT) devices. To detect and classify malware attacks, automated malware detection and classification is an essential subsystem in healthcare cyber-physical systems. This work proposes an attention...
Article
A survey of the literature shows that the number of IoT attacks are gradually growing over the years due to the growing trend of Internet-enabled devices. Software defined networking (SDN) is a promising advanced computer network technology that supports IoT. A network intrusion detection system is an essential component in the SDN-IoT network envi...
Article
Full-text available
Dry eye disease (DED) is a chronic eye disease and a common complication among the world's population. Evaporation of moisture from tear film or a decrease in tear production leads to an unstable tear film which causes DED. The tear film breakup time (TBUT) test is a common clinical test used to diagnose DED. In this test, DED is diagnosed by measu...
Article
Multimedia Communications of Internet of Vehicles (IoV) uses WLAN, NFC and Fifth Generation networks. At the same time, in multimedia communications in healthcare, IoV's essential task is optimizing the quality of experience (QoE) via regulating wireless links between cars. In addition, the artificial intelligence (AI) method has revolutionized IoV...
Preprint
Full-text available
Internet of Underwater Things (IoUT) have gained rapid momentum over the past decade with applications spanning from environmental monitoring and exploration, defence applications, etc. The traditional IoUT systems use machine learning (ML) approaches which cater the needs of reliability, efficiency and timeliness. However, an extensive review of t...
Article
Full-text available
This paper proposes a multichannel deep learning approach for lung disease detection using chest X-rays. The multichannel models used in this work are EfficientNetB0, EfficientNetB1, and EfficientNetB2 pretrained models. The features from EfficientNet models are fused together. Next, the fused features are passed into more than one non-linear fully...
Article
Full-text available
Massive multidimensional health data collected from Internet of Things (IoT) devices are driving a new era of smart health, and with it come privacy concerns. Privacy-preserving data aggregation (PDA) is a proven solution providing statistics while hiding raw data. However, existing PDA schemes ignore the willingness of data owners to share, so dat...
Article
Full-text available
This work proposes an end-to-end model for network attack detection and network attack classification using deep learning-based recurrent models. The proposed model extracts the features of hidden layers of recurrent models and further employs a kernel-based principal component analysis (KPCA) feature selection approach to identify optimal features...
Article
Due to the explosive increase of electric vehicles (EV) and universal charging stations (CS), achieving fast authentication is an important topic in the vehicle-to-grid (V2G) network at present. Fast authentication can not only forcefully defend potential adversaries but also can greatly speed up the charging process between EVs and CSs. Although m...
Preprint
Full-text available
In the past few years, artificial intelligence (AI) techniques have been implemented in almost all verticals of human life. However, the results generated from the AI models often lag explainability. AI models often appear as a blackbox wherein developers are unable to explain or trace back the reasoning behind a specific decision. Explainable AI (...
Article
Full-text available
Many consumers participate in the smart city via smart portable gadgets such as wearables, personal gadgets, mobile devices, or sensor systems. In the edge computation systems of IoT in the smart city, the fundamental difficulty of the sensor is to pick reliable participants. Since not all smart IoT gadgets are dedicated, certain intelligent IoT ga...
Article
Full-text available
Because of the powerful computing and storage capability in cloud computing, machine learning as a service (MLaaS) has recently been valued by the organizations for machine learning training over some related representative datasets. When these datasets are collected from different organizations and have different distributions, multi-task learning...
Article
Full-text available
With the construction of intelligent transportation, big data with heterogeneous, multi-source and massive characteristics has become an important carrier of cooperative intelligent transportation systems (C-ITS) and plays an important role. Big data in C-ITS can break through the restrictions between regions and entities and then learning cooperat...
Article
Full-text available
The rapid development of Internet of Things (IoT) stimulates the innovation for the health-related devices such as remote patient monitoring, connected inhalers and ingestible sensors. Simultaneously, with the aid of numerous equipments, a great number of collected data can be used for disease prediction or diagnosis model establishment. However, t...
Article
The deep learning methods had been proved to be effective for malware detection in the past. However, the recent studies show that deep learning models are vulnerable to adversarial attacks. Thus, the malware detection models based on deep learning face the threat of adversarial examples. As a popular case of adversarial examples, adversarial image...
Article
Full-text available
Smart grids (SG) are electricity grids that communicate with each other, provide reliable information, and enable administrators to operate energy supplies across the country, ensuring optimized reliability and efficiency. The smart grid contains sensors that measure and transmit data to adjust the flow of electricity automatically based on supply/...
Article
As a promising enabler for edge intelligence, Un-manned Aerial Vehicles (UAV) have become more and more important in Mobile Edge Computing Networks (MECN), such as communication, computation, collection and control service supply. Although Age of Information (AoI) minimization is indispensable for fresh information collection and computation in the...
Article
Full-text available
The high computational capability provided by a data centre makes it possible to solve complex manufacturing issues and carry out large-scale collaborative cloud manufacturing. Accurate, real-time estimation of the power required by a data centre can help resource providers predict the total power consumption and improve resource utilisation. To en...
Article
Full-text available
Critical infrastructures (CIs) include the vital resources for the country’s economic and health systems and should be kept secure. We face improvements in the Internet of Things which brings benefits and, at the same time, dependency for CIs. Internet of Medical Things (IoMT) is among the CI sectors that gather health-related information from pati...
Article
Full-text available
With the widespread use of Internet of things (IoT), mobile phones, connected devices and artificial intelligence (AI), recommender systems (RSs) have become a booming technology because of their capability to analyze big data and shape users’ habits through well-designed, contextual, and engaging recommendations. Novel generations of RSs have been...
Article
Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this technology. Consensus protocol/algorithm helps to provide a decentralized decision making process. An efficient consensus alg...
Article
In the undertaken study, we have used a cus-tomized dataset termed "Cardiac-200" and the benchmark dataset "PhysioNet." which contains 1500 heartbeat acoustic event samples (without augmentation) and 1950 samples (with augmentation) heartbeat acoustic events such as normal, murmur , extrasystole, artifact, and other unlabeled heartbeat acoustic eve...
Article
Full-text available
With the intelligentization of Maritime Transportation System (MTS), Internet of Thing (IoT) and machine learning technologies have been widely used to achieve intelligent control and routing planning for ships. As an important branch of machine learning, federated learning is the first choice to train an accurate joint model without sharing ships'...
Article
The Intelligent Transportation System (ITS) is said to revolutionize the travel experience by making it safe, secure and comfortable for the people. Although vehicles have been automated up to a certain extent it still has critical security issues that require thorough study and advanced solutions. The security vulnerabilities of ITS allows the att...
Article
Full-text available
Recent technological developments, such as the Internet of Things (IoT), artificial intelligence, edge, and cloud computing, have paved the way in transforming traditional healthcare systems into smart healthcare (SHC) systems. SHC escalates healthcare management with increased efficiency, convenience, and personalization, via use of wearable devic...
Article
Full-text available
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Things (IoT) applications, including e-healthcare services wherein smart devices collect patient data and deliver it remotely to the servers in real-time. Despite its enormous benefits, IoT in healthcare has not received much attention primarily due to t...
Article
Artificial Intelligence (AI) and Data Analytics play a crucial role in building a digitalized society that is ethical and inclusive. AI is a simulation that is trained to learn and mimic human behaviour. These AI algorithms are capable of learning from their mistakes and doing tasks that are comparable to those performed by humans. AI will have a s...
Article
Healthcare has evolved significantly in recent years primarily due to the advancements in and increasing adoption of technology in healthcare processes such as data collection, storage, diagnostics, and treatment. The emergence of the industrial internet of things (IIoT) has further evolved e-Health by facilitating the development of connected heal...
Article
Recent advances in Artificial Intelligence (AI) and Internet of Things (IoT) have facilitated continuous improvement in smart city based applications such as smart healthcare, transportation, and environmental management. Digital Twin (DT) is an AI-based virtual replica of the real-world physical entity. DTs have been successfully adopted in manufa...
Article
Full-text available
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat cybercrimes timely and effectively. Cyberattacks on computing machines leave certain artifacts on target device storage that can reveal the identity and behavior of cyber-criminals if processed and analyzed intelligently. Forensic agencies and law enforceme...
Article
After Bitcoin's emergence, blockchain found its way to many industries, including Fintech, Energy, and Manufacturing. Blockchains consensus algorithms, including Nakamoto's, are mechanisms to probabilistically guarantee that a transaction is not undone after confirmation. This requires that no one's computational power exceeds 50% of the network po...
Book
Full-text available
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book pr...
Article
Ambient intelligence plays a crucial role in healthcare situations. It provides a certain way to deal with emergencies to provide the essential resources such as nearest hospitals and emergency stations promptly to avoid deaths. Since the outbreak of Covid-19, several artificial intelligence techniques have been used. However, situation awareness i...
Chapter
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current location. It is well-acknowledged that location privacy is vital to users and several prominent Secure k...
Article
Full-text available
The Internet of Things (IoT) development made it possible for technology to communicate physical education by connecting cost-effective heterogeneous devices and digital applications to uncontrolled and accessible environments. The traditional physical education monitoring environment creates crucial manual efforts on athletes' activity observation...
Article
The electricity demands are floated through smart grid (SG) devices to a remote power management system and utility center (UC) for utilizing energy-based services, while the UCs manage the distribution of power. Nevertheless, in smart grid systems, the communication messages are susceptible to various threats, since the information related to powe...
Article
As one of most successful industrial realizations of Internet of Things, a smart grid is a smart IoT system that deploys widespread smart meters to capture fine-grained data on residential power usage. It suffers diverse privacy attacks, which seriously increases the risk of violating the privacy of customers. Although some solutions have been prop...