Select Publications

Journal articles

Mamun AA; Al-Sahaf H; Welch I; Mansoori M; Camtepe S, 2024, 'Detection of advanced persistent threat: A genetic programming approach', Applied Soft Computing, 167, http://dx.doi.org/10.1016/j.asoc.2024.112447

Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599] (Computers & Security (2022) 115, (S0167404821004223), (10.1016/j.cose.2021.102599))', Computers and Security, 117, http://dx.doi.org/10.1016/j.cose.2022.102689

Abbasi MS; Al-Sahaf H; Mansoori M; Welch I, 2022, 'Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection', Applied Soft Computing, 121, http://dx.doi.org/10.1016/j.asoc.2022.108744

Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Probabilistic modelling of deception-based security framework using markov decision process', Computers and Security, 115, http://dx.doi.org/10.1016/j.cose.2021.102599

Haseeb J; Mansoori M; Hirose Y; Al-Sahaf H; Welch I, 2022, 'Autoencoder-based feature construction for IoT attacks clustering', Future Generation Computer Systems, 127, pp. 487 - 502, http://dx.doi.org/10.1016/j.future.2021.09.025

Mansoori M; Welch I, 2020, 'How do they find us? A study of geolocation tracking techniques of malicious web sites', Computers and Security, 97, http://dx.doi.org/10.1016/j.cose.2020.101948

Mansoori M; Welch I; Choo KKR; Maxion RA; Hashemi SE, 2017, 'Real-world IP and network tracking measurement study of malicious websites with HAZOP', International Journal of Computers and Applications, 39, pp. 106 - 121, http://dx.doi.org/10.1080/1206212X.2017.1283910

Mansoori M; Zakaria O; Gani A, 2012, 'Improving exposure of intrusion deception system through implementation of hybrid honeypot', International Arab Journal of Information Technology, 9


Back to profile page