BibTeX records: Mohammed M. Alani

download as .bib file

@article{DBLP:journals/cee/Alani23,
  author       = {Mohammed M. Alani},
  title        = {An explainable efficient flow-based Industrial IoT intrusion detection
                  system},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108732},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108732},
  doi          = {10.1016/J.COMPELECENG.2023.108732},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/Alani23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {XMal: {A} lightweight memory-based explainable obfuscated-malware
                  detector},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103409},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103409},
  doi          = {10.1016/J.COSE.2023.103409},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/AlaniAB23,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad and
                  Ezedin Barka},
  title        = {{ARP-PROBE:} An {ARP} spoofing detector for Internet of Things networks
                  using explainable deep learning},
  journal      = {Internet Things},
  volume       = {23},
  pages        = {100861},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100861},
  doi          = {10.1016/J.IOT.2023.100861},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/AlaniAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/AlaniMD23,
  author       = {Mohammed M. Alani and
                  Lara Mauri and
                  Ernesto Damiani},
  title        = {A two-stage cyber attack detection and classification system for smart
                  grids},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100926},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100926},
  doi          = {10.1016/J.IOT.2023.100926},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/AlaniMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlaniD23,
  author       = {Mohammed M. Alani and
                  Ernesto Damiani},
  title        = {XRecon: An Explainbale IoT Reconnaissance Attack Detection System
                  Based on Ensemble Learning},
  journal      = {Sensors},
  volume       = {23},
  number       = {11},
  pages        = {5298},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23115298},
  doi          = {10.3390/S23115298},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlaniD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlaniA23,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {An Intelligent Two-Layer Intrusion Detection System for the Internet
                  of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {1},
  pages        = {683--692},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3192035},
  doi          = {10.1109/TII.2022.3192035},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/AlaniA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Forensic Identification of Android Trojans Using Stacked Ensemble
                  of Deep Neural Networks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {642--656},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_34},
  doi          = {10.1007/978-3-031-41181-6\_34},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {Explainable Ensemble-Based Detection of Cyber Attacks on Internet
                  of Medical Things},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates,
                  November 14-17, 2023},
  pages        = {609--614},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361448},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361448},
  timestamp    = {Tue, 23 Jan 2024 20:30:56 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection
                  in Internet of Medical Things},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {144--151},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011749200003405},
  doi          = {10.5220/0011749200003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intenv/AlaniB23,
  author       = {Mohammed M. Alani and
                  Thar Baker},
  editor       = {Girish Bekaroo and
                  Somaya Ben Allouch and
                  Massimo Mecella},
  title        = {A Survey of Smart Grid Intrusion Detection Datasets},
  booktitle    = {Workshop Proceedings of the 19th International Conference on Intelligent
                  Environments (IE2023), Mauritius, 27-30 June 2023},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {32},
  pages        = {5--13},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/AISE230004},
  doi          = {10.3233/AISE230004},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intenv/AlaniB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00070,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {Adversarial Explainability: Utilizing Explainable Machine Learning
                  in Bypassing IoT Botnet Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2310.00070},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00070},
  doi          = {10.48550/ARXIV.2310.00070},
  eprinttype    = {arXiv},
  eprint       = {2310.00070},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlaniA22,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {{PAIRED:} An Explainable Lightweight Android Malware Detection System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {73214--73228},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3189645},
  doi          = {10.1109/ACCESS.2022.3189645},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlaniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BakerASSAB22,
  author       = {Thar Baker and
                  Muhammad Asim and
                  Hezekiah Samwini and
                  Nauman Shamim and
                  Mohammed M. Alani and
                  Rajkumar Buyya},
  title        = {A blockchain-based Fog-oriented lightweight framework for smart public
                  vehicular transportation systems},
  journal      = {Comput. Networks},
  volume       = {203},
  pages        = {108676},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2021.108676},
  doi          = {10.1016/J.COMNET.2021.108676},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BakerASSAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlaniT22,
  author       = {Mohammed M. Alani and
                  Hissam Tawfik},
  title        = {PhishNot: {A} Cloud-Based Machine-Learning Approach to Phishing {URL}
                  Detection},
  journal      = {Comput. Networks},
  volume       = {218},
  pages        = {109407},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109407},
  doi          = {10.1016/J.COMNET.2022.109407},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AlaniT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Alani22,
  author       = {Mohammed M. Alani},
  title        = {BotStop : Packet-based efficient and explainable IoT botnet detection
                  using machine learning},
  journal      = {Comput. Commun.},
  volume       = {193},
  pages        = {53--62},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.06.039},
  doi          = {10.1016/J.COMCOM.2022.06.039},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Alani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniA22,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {AdStop: Efficient flow-based mobile adware detection using machine
                  learning},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102718},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102718},
  doi          = {10.1016/J.COSE.2022.102718},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AlsadhanHLATKF22,
  author       = {Abeer Abdullah Alsadhan and
                  Abir Hussain and
                  Panos Liatsis and
                  Mohammed M. Alani and
                  Hissam Tawfik and
                  Phillip Kendrick and
                  Hulya Francis},
  title        = {Locally weighted classifiers for detection of neighbor discovery protocol
                  distributed denial-of-service and replayed attacks},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.3700},
  doi          = {10.1002/ETT.3700},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/AlsadhanHLATKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlaniM22,
  author       = {Mohammed M. Alani and
                  Ali Miri},
  title        = {Towards an Explainable Universal Feature Set for IoT Intrusion Detection},
  journal      = {Sensors},
  volume       = {22},
  number       = {15},
  pages        = {5690},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22155690},
  doi          = {10.3390/S22155690},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlaniM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Alani22,
  author       = {Mohammed M. Alani},
  title        = {IoTProtect: {A} Machine-Learning Based IoT Intrusion Detection System},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {61--65},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00020},
  doi          = {10.1109/CSP55486.2022.00020},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/Alani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AlaniDG22,
  author       = {Mohammed M. Alani and
                  Ernesto Damiani and
                  Uttam Ghosh},
  title        = {DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System
                  for Industrial {IOT}},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} Workshops, Bologna, Italy, July 10, 2022},
  pages        = {169--174},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCSW56584.2022.00040},
  doi          = {10.1109/ICDCSW56584.2022.00040},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/AlaniDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/Alani21,
  author       = {Mohammed M. Alani},
  title        = {Big data in cybersecurity: a survey of applications and future trends},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {7},
  number       = {2},
  pages        = {85--114},
  year         = {2021},
  url          = {https://doi.org/10.1007/s40860-020-00120-3},
  doi          = {10.1007/S40860-020-00120-3},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrie/Alani21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/Alani21,
  author       = {Mohammed M. Alani},
  editor       = {Ajith Abraham and
                  Niketa Gandhi and
                  Thomas Hanne and
                  Tzung{-}Pei Hong and
                  Tatiane Nogueira Rios and
                  Weiping Ding},
  title        = {Implementation-Oriented Feature Selection in {UNSW-NB15} Intrusion
                  Detection Dataset},
  booktitle    = {Intelligent Systems Design and Applications - 21st International Conference
                  on Intelligent Systems Design and Applications {(ISDA} 2021) Held
                  During December 13-15, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {418},
  pages        = {548--558},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96308-8\_51},
  doi          = {10.1007/978-3-030-96308-8\_51},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isda/Alani21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/AlaniAN20,
  author       = {Mohammed M. Alani and
                  Muath Alrammal and
                  Munir Naveed},
  title        = {Implementing IoT Lottery on Data Encryption Standard},
  journal      = {J. Commun.},
  volume       = {15},
  number       = {10},
  pages        = {735--740},
  year         = {2020},
  url          = {https://doi.org/10.12720/jcm.15.10.735-740},
  doi          = {10.12720/JCM.15.10.735-740},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/AlaniAN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/TawfikHYAG20,
  author       = {Hissam Tawfik and
                  Jia Hu and
                  Kevin Kam Fung Yuen and
                  Mohammed M. Alani and
                  Nektarios Georgalas},
  title        = {Special issue on security, usability and sustainability of smart cities},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {6},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1007/s40860-020-00101-6},
  doi          = {10.1007/S40860-020-00101-6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrie/TawfikHYAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcom/Alani20,
  author       = {Mohammed M. Alani},
  editor       = {Dinko Begusic and
                  Nikola Rozic and
                  Josko Radic and
                  Matko Saric},
  title        = {On Recent Security Issues in Machine Learning},
  booktitle    = {28th International Conference on Software, Telecommunications and
                  Computer Networks, SoftCOM 2020, Split, Croatia, September 17-19,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/SoftCOM50211.2020.9238337},
  doi          = {10.23919/SOFTCOM50211.2020.9238337},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/softcom/Alani20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlloghaniAABMHA19,
  author       = {Mohamed Alloghani and
                  Mohammed M. Alani and
                  Dhiya Al{-}Jumeily and
                  Thar Baker and
                  Jamila Mustafina and
                  Abir Hussain and
                  Ahmed J. Aljaaf},
  title        = {A systematic review on the status and progress of homomorphic encryption
                  technologies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102362},
  doi          = {10.1016/J.JISA.2019.102362},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlloghaniAABMHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/AnyaTAH19,
  author       = {Obinna Anya and
                  Hissam Tawfik and
                  Mohammed M. Alani and
                  Jia Hu},
  title        = {Cybersecurity design considerations for cross-boundary clinical decision
                  support},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {5},
  number       = {2},
  pages        = {91--103},
  year         = {2019},
  url          = {https://doi.org/10.1007/s40860-019-00076-z},
  doi          = {10.1007/S40860-019-00076-Z},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrie/AnyaTAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/Alani19,
  author       = {Mohammed M. Alani},
  editor       = {Yulin Wang and
                  Chin{-}Chen Chang},
  title        = {Applications of machine learning in cryptography: a survey},
  booktitle    = {Proceedings of the 3rd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21,
                  2019},
  pages        = {23--27},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309074.3309092},
  doi          = {10.1145/3309074.3309092},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/Alani19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04109,
  author       = {Mohammed M. Alani},
  title        = {Applications of Machine Learning in Cryptography: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/1902.04109},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04109},
  eprinttype    = {arXiv},
  eprint       = {1902.04109},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04109.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dese/AlsadhanHA18,
  author       = {Abeer Abdullah Alsadhan and
                  Abir Hussain and
                  Mohammed M. Alani},
  title        = {Detecting {NDP} Distributed Denial of Service Attacks Using Machine
                  Learning Algorithm Based on Flow-Based Representation},
  booktitle    = {11th International Conference on Developments in eSystems Engineering,
                  DeSE 2018, Cambridge, United Kingdom, September 2-5, 2018},
  pages        = {134--140},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DeSE.2018.00028},
  doi          = {10.1109/DESE.2018.00028},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dese/AlsadhanHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit/Alani18,
  author       = {Mohammed M. Alani},
  title        = {IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks},
  booktitle    = {Proceedings of the 6th International Conference on Information Technology:
                  IoT and Smart City, December 29-31, Hong Kong, China},
  pages        = {140--144},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3301551.3301606},
  doi          = {10.1145/3301551.3301606},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icit/Alani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/ATSA2018,
  editor       = {Mohammed M. Alani and
                  Hissam Tawfik and
                  Mohammed Saeed and
                  Obinna Anya},
  title        = {Applications of Big Data Analytics, Trends, Issues, and Challenges},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76472-6},
  doi          = {10.1007/978-3-319-76472-6},
  isbn         = {978-3-319-76471-9},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/ATSA2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-03314,
  author       = {Mohammed M. Alani},
  title        = {IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks},
  journal      = {CoRR},
  volume       = {abs/1812.03314},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.03314},
  eprinttype    = {arXiv},
  eprint       = {1812.03314},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-03314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Alani17,
  author       = {Mohammed M. Alani},
  title        = {Guide to Cisco Routers Configuration - Becoming a Router Geek, Second
                  Edition},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54630-8},
  doi          = {10.1007/978-3-319-54630-8},
  isbn         = {978-3-319-54629-2},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Alani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/Alani17,
  author       = {Mohammed M. Alani},
  title        = {Android Users Privacy Awareness Survey},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {11},
  number       = {3},
  pages        = {130--144},
  year         = {2017},
  url          = {https://doi.org/10.3991/ijim.v11i3.6605},
  doi          = {10.3991/IJIM.V11I3.6605},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/Alani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awict/Alani17,
  author       = {Mohammed M. Alani},
  editor       = {Hani Hamdan},
  title        = {Prioritizing Cloud Security Controls},
  booktitle    = {Proceedings of the Second International Conference on Advanced Wireless
                  Information, Data, and Communication Technologies, {AWICT} 2017, Paris,
                  France, November 13-14, 2017},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3231830.3231831},
  doi          = {10.1145/3231830.3231831},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/awict/Alani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/Alani16,
  author       = {Mohammed M. Alani},
  title        = {Elements of Cloud Computing Security - {A} Survey of Key Practicalities},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41411-9},
  doi          = {10.1007/978-3-319-41411-9},
  isbn         = {978-3-319-41410-2},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/Alani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/Alani14,
  author       = {Mohammed M. Alani},
  title        = {Guide to {OSI} and {TCP/IP} Models},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05152-9},
  doi          = {10.1007/978-3-319-05152-9},
  isbn         = {978-3-319-05151-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/Alani14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsce/Alani14,
  author       = {Mohammed M. Alani},
  title        = {{MANET} security: {A} survey},
  booktitle    = {2014 {IEEE} International Conference on Control System, Computing
                  and Engineering, {ICCSCE} 2014, Penang, Malaysia, November 28-30,
                  2014},
  pages        = {559--564},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCSCE.2014.7072781},
  doi          = {10.1109/ICCSCE.2014.7072781},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsce/Alani14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0030285,
  author       = {Mohammed M. Alani},
  title        = {Guide to Cisco Routers Configuration - Becoming a Router Geek},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-1-4471-4246-1},
  doi          = {10.1007/978-1-4471-4246-1},
  isbn         = {978-1-4471-4245-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0030285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Alani12,
  author       = {Mohammed M. Alani},
  editor       = {Tingwen Huang and
                  Zhigang Zeng and
                  Chuandong Li and
                  Chi{-}Sing Leung},
  title        = {Neuro-Cryptanalysis of {DES} and Triple-DES},
  booktitle    = {Neural Information Processing - 19th International Conference, {ICONIP}
                  2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7667},
  pages        = {637--646},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34500-5\_75},
  doi          = {10.1007/978-3-642-34500-5\_75},
  timestamp    = {Tue, 30 Jun 2020 11:04:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/Alani12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/Alani12,
  author       = {Mohammed M. Alani},
  title        = {Neuro-cryptanalysis of {DES}},
  booktitle    = {2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON,
                  Canada, June 10-12, 2012},
  pages        = {23--27},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6280190/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/Alani12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics