default search action
Hisham Alasmary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j24]Isa Ali Ibrahim, Abdallah Namoun, Sami Ullah, Hisham Alasmary, Muhammad Waqas, Iftekhar Ahmad:
Infrared Ship Segmentation Based on Weakly-Supervised and Semi-Supervised Learning. IEEE Access 12: 117908-117920 (2024) - [j23]Usama Arshad, Zahid Halim, Hisham Alasmary, Muhammad Waqas:
Futuristic Decentralized Vehicular Network Architecture and Repairing Management System on Blockchain. IEEE Internet Things J. 11(13): 23604-23616 (2024) - [j22]Hisham Alasmary:
ScalableDigitalHealth (SDH): An IoT-Based Scalable Framework for Remote Patient Monitoring. Sensors 24(4): 1346 (2024) - [j21]Jiangjiang Zhang, Zhenhu Ning, Muhammad Waqas, Hisham Alasmary, Shanshan Tu, Sheng Chen:
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization. IEEE Trans. Computers 73(1): 192-205 (2024) - [j20]Shanshan Tu, Akhtar Badshah, Hisham Alasmary, Muhammad Waqas:
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing. IEEE Trans. Mob. Comput. 23(5): 4752-4763 (2024) - [j19]Muhammad Tanveer, Hisham Alasmary, Neeraj Kumar, Amiya Nayak:
SAAF-IoD: Secure and Anonymous Authentication Framework for the Internet of Drones. IEEE Trans. Veh. Technol. 73(1): 232-244 (2024) - [j18]Fenhua Bai, Tao Shen, Zhuo Yu, Jian Song, Bei Gong, Muhammad Waqas, Hisham Alasmary:
Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile Network. IEEE Trans. Wirel. Commun. 23(9): 12140-12156 (2024) - 2023
- [j17]Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim Ahmed Khan:
A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry. IEEE Access 11: 67626-67639 (2023) - [j16]Muhammad Waqas, Shanshan Tu, Jialin Wan, Talha Mir, Hisham Alasmary, Ghulam Abbas:
Defense scheme against advanced persistent threats in mobile fog computing security. Comput. Networks 221: 109519 (2023) - [j15]Usman Haider, Muhammad Waqas, Muhammad Hanif, Hisham Alasmary, Saeed Mian Qaisar:
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks. Comput. Commun. 197: 141-150 (2023) - [j14]Muhammad Tanveer, Akhtar Badshah, Abd Ullah Khan, Hisham Alasmary, Shehzad Ashraf Chaudhry:
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things. Internet Things 23: 100902 (2023) - [j13]Qi Wang, Zhaoying Liu, Ting Zhang, Hisham Alasmary, Muhammad Waqas, Zahid Halim, Yujian Li:
Deep convolutional cross-connected kernel mapping support vector machine based on SelectDropout. Inf. Sci. 626: 694-709 (2023) - [j12]Muhammad Tanveer, Hisham Alasmary:
LACP-SG: Lightweight Authentication Protocol for Smart Grids. Sensors 23(4): 2309 (2023) - [j11]Muhammad Fawad, Muhammad Zahid Khan, Khalil Ullah, Hisham Alasmary, Danish Shehzad, Bilal Khan:
Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks. Sensors 23(5): 2796 (2023) - [j10]Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat ur Rehman:
Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry 15(11): 1981 (2023) - 2022
- [j9]Bilal Khan, Rashid Naseem, Iftikhar Alam, Inayat Khan, Hisham Alasmary, Taj Rahman:
Analysis of Tree-Family Machine Learning Techniques for Risk Prediction in Software Requirements. IEEE Access 10: 98220-98231 (2022) - [j8]Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j7]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen:
RouteChain: Towards Blockchain-based secure and efficient BGP routing. Comput. Networks 217: 109362 (2022) - [j6]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [j5]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3432-3447 (2022) - 2021
- [j4]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen:
Domain name system security and privacy: A contemporary survey. Comput. Networks 185: 107699 (2021) - [j3]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen:
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699. Comput. Networks 188: 107814 (2021) - 2020
- [j2]Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. EAI Endorsed Trans. Security Safety 7(23): e1 (2020) - 2019
- [j1]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019)
Conference and Workshop Papers
- 2022
- [c13]Said Bakhshad, Vasaki Ponnusamy, Robithoh Annur, Muhammad Waqas, Hisham Alasmary, Shanshan Tu:
Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment. CITS 2022: 1-7 - [c12]Shanshan Tu, Fengming Huang, Shengju Zhang, Akhtar Badshah, Hisham Alasmary, Muhammad Waqas:
Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing. CITS 2022: 1-7 - [c11]Mansoor Khan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas, Hisham Alasmary, Muhammad Waqas:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. ICCNS 2022: 159-167 - 2020
- [c10]Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. ICDCS 2020: 888-898 - [c9]Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. ICICS 2020: 443-461 - 2019
- [c8]Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, Aziz Mohaisen:
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. CSoNet 2019: 268-281 - [c7]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
IoT malware ecosystem in the wild: a glimpse into analysis and exposures. SEC 2019: 413-418 - [c6]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, Aziz Mohaisen:
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing. IEEE ICBC 2019: 210-218 - [c5]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Aziz Mohaisen:
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. ICDCS 2019: 1296-1305 - [c4]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. WiSec 2019: 288-289 - [c3]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. WiSec 2019: 290-291 - 2018
- [c2]Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. CSoNet 2018: 259-272 - [c1]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955
Informal and Other Publications
- 2021
- [i7]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i6]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - 2020
- [i5]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification. CoRR abs/2005.07145 (2020) - [i4]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen:
Domain Name System Security and Privacy: A Contemporary Survey. CoRR abs/2006.15277 (2020) - 2019
- [i3]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing Endpoints in the Internet of Things Malware. CoRR abs/1902.03531 (2019) - [i2]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. CoRR abs/1902.03955 (2019) - [i1]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems. CoRR abs/1902.04416 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint