top of page

Publications

  • N. Islam, A. Alazab, and J. Agbinya, "Energy Efficient and Delay Aware 5G Multi-Tier Network," Remote Sensing, vol. 11, no. 9, p. 1019, 2019. Impact Factor 3.4

  • Ghassan Kbar, A.Alazab, “Multi-factor based enhancing students’ motivations”, accepted IEEE-ICIT 2019 IEEE-ICIT 2019: 20th IEEE International Conference on Industrial Technology.

  • Savitri Bevinakoppa, A.Alazab, Tony Jan. (2018) Design of Computer Networking Courses with Major in Cyber Security. International Journal of Education and Learning Systems, 3, 111-116.

  • Ghassan Kbar, A.Alazab, “A Comprehensive Protection Method for securing the organisation's network against Cyberattacks”, 9th International Conferences on Cyber Security and Communication Systems, December 2018

  • Nahina, A.Alazab, “A reinforcement learning based algorithm towards energy efficient 5G Multitier network”, 9th International Conferences on Cyber Security and Communication Systems, December 2018

  • Mahmoud Bakkar, Halim Khelalfa, Elspeth McKay, A.Alazab, “Information Security: Definitions, Threats and Management in Dubai Hospitals Context”, 9th International Conferences on Cyber Security and Communication Systems, December 2018

  • Mahmoud Bakkar, A.Alazab, Mohamad Waseem, Raouf Abdul Samad ,“On Prevention and Detection Petrol Theft in Australia using Mac Addresses” 9th International Conferences on Cyber Security and Communication Systems, December 2018

  • A.Alazab, Savitri Bevinakoppa, & K. Ansam (2018) “Maximizing Competitive Advantage on E-Business Websites: A Data Mining Approach”, accepted for publication, November 2018, IEEE Conference on Big Data and Analytics 2018

  • A.Alazab & K. Ansam (2016) “New Strategy for Mitigating of SQL Injection Attack”, International Journal of Computer Applications 154(11):1-10, November 2016

  • A.Alazab, K. Ansam, A., Abawajy, J. H., & Hobbs, M., “Using Response Action with Intelligent Intrusion Detection and Prevention System against Web Application Malware, Information Management and Computer Security, April, 2014.

  • A.Alazab, K. Ansam, A., Abawajy, J. H., & Hobbs, M. (2013), “Multi stage Rules for Intrusion Detection System”, International Journal of Information Security and Privacy (IJISP), IGI, July, 2013.

  • K. Ansam, A. Alazab, A.Abawajy, J. H., & Hobbs, M. (2013), “Trends in Crime toolkits Developments”, In A. Amine, O. Mohamed and B. Benatallah (Eds) Network Security Technologies: Design and Applications, IGI, June, 2013.

  • A.Alazab, K. Ansam, A., Abawajy, J. H., & Hobbs, M. (2013), “Crime Toolkits: The current threats to web applications”, Journal of Information Privacy and Security, 9(2), 21-39.

  • A. Alazab, M. Hobbs, J. Abawajy, and K. Ansam, "Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware," in Advances in Security of Information and Communication Networks. vol. 381, A. Awad, A. Hassanien, and K. Baba, Eds., ed: Springer Berlin Heidelberg, 2013, pp. 177-184.

  • A.Alazab, A., Abawajy, J. H., & Hobbs, M. (2013) and K. Ansam, in press “Detection and Protection of SQL injection”, Journal of Information Privacy and Security (JIPS), 2013.

  • A. Alazab, A.Abawajy, J. H., & K.Ansam (2013),” Crime Toolkits: The Productisation of Cybercrime”, Proceedings of the 10th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM)

  • A. Alazab, M. Alazab, J. Abawajy, and M. Hobbs, "Web application protection against SQL injection attack," in ICITA 2011: Proceedings of the 7th International Conference on Information Technology and Applications ICITA 2011, 2012, pp. 1-7  

  • A. Alazab, M. Hobbs, J. Abawajy, and M. Alazab, "Using feature selection for intrusion detection system," in Communications and Information Technologies (ISCIT), 2012 International Symposium on, 2012, pp. 296-301  

  • A. Alazab, S. Venkatraman, J. Abawajy, and M. Alazab, "An optimal transportation routing approach using GIS-based dynamic traffic flows," 3rd International Conference on Information and Financial Engineering IPEDR, vol. 12, 2011.

  • M. Alazab, A. Alazab, and B. Lynn, "Smartphone malware based on synchronisation vulnerabilities," in ICITA 2011: Proceedings of the 7th International Conference on Information Technology and Applications, 2012, pp. 1-6.  

  • M. Alazab, S. Venkatraman, P. Watters, M. Alazab, and A. Alazab, "Cybercrime: the case of obfuscated malware," Global Security, Safety and Sustainability & e-Democracy, pp. 204-211, 2012.

  • S. Alhyari, M. Alazab, S. Venkatraman, M. Alazab, and A. Alazab, "Six sigma approach to improve quality in E-services: an empirical study in Jordan," International Journal of Electronic Government Research (IJEGR), vol. 8, pp. 57-74, 2012.  

  • S. Elaiwat, A. Alazab, S. Venkatraman, and M. Alazab, "GOM: new genetic optimizing model for broadcasting tree in MANET," Proceedings of IEEE 2nd International Conference on Computer Technology and Development (ICCTD 2010), 2010.

  • S. Elaiwat, A. Alazab, S. Venkatraman, and M. Alazab, "Applying genetic algorithm for optimizing broadcasting process in ad-hoc network," Int. J. of Recent Trends in Engineering and Technology, vol. 4, 2010.

© 2023 by GREG SAINT. Proudly created with Wix.com

image 12.jpg
  • s-facebook
  • Twitter Metallic
  • s-linkedin
bottom of page