Select Publications

Books

Abdel-Basset M; Moustafa N; Hawash H; Tari Z, 2023, Responsible Graph Neural Networks, http://dx.doi.org/10.1201/9781003329701

Abdel-Basset M; Moustafa N; Hawash H, 2022, Deep learning approaches for security threats in IoT environments, http://dx.doi.org/10.1002/9781119884170

Ahmed M; Islam SR; Anwar A; Moustafa N; Pathan ASK, 2022, Preface

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface i

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface ii

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Deep Learning Techniques for IoT Security and Privacy, Springer International Publishing, http://dx.doi.org/10.1007/978-3-030-89025-4

Gallagher M; Moustafa N; Lakshika E, 2020, Preface

Book Chapters

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6

Moustafa N, 2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Salim S; Moustafa N; Hassanian M; Ormod D; Slay J, 2024, 'Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications', IEEE Internet of Things Journal, 11, pp. 3853 - 3867, http://dx.doi.org/10.1109/JIOT.2023.3301626

Al-Hawawreh M; Moustafa N, 2024, 'Explainable deep learning for attack intelligence and combating cyber–physical attacks', Ad Hoc Networks, 153, http://dx.doi.org/10.1016/j.adhoc.2023.103329

Al-Hawawreh M; Moustafa N; Slay J, 2024, 'A threat intelligence framework for protecting smart satellite-based healthcare networks', Neural Computing and Applications, 36, pp. 15 - 35, http://dx.doi.org/10.1007/s00521-021-06441-5

Whitty MT; Moustafa N; Grobler M, 2024, 'Cybersecurity when working from home during COVID-19: considering the human factors', Journal of Cybersecurity, 10, http://dx.doi.org/10.1093/cybsec/tyae001

Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2024, 'Feature extraction for machine learning-based intrusion detection in IoT networks', Digital Communications and Networks, http://dx.doi.org/10.1016/j.dcan.2022.08.012

Zhou Y; Ren Y; Yi M; Xiao Y; Tan Z; Moustafa N; Tian Z, 2023, 'CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships', IEEE Transactions on Sustainable Computing, 8, pp. 627 - 638, http://dx.doi.org/10.1109/TSUSC.2023.3240411

Sobb T; Turnbull B; Moustafa N, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391

Hussien RM; Abohany AA; Moustafa N; Sallam KM, 2023, 'An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks', Neural Computing and Applications, 35, pp. 18665 - 18680, http://dx.doi.org/10.1007/s00521-023-08695-7

Keshk M; Koroniotis N; Pham N; Moustafa N; Turnbull B; Zomaya AY, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000

Schiliro F; Moustafa N; Razzak I; Beheshti A, 2023, 'DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 7485 - 7493, http://dx.doi.org/10.1109/TITS.2022.3166631

Alsherbiny MA; Radwan I; Moustafa N; Bhuyan DJ; El-Waisi M; Chang D; Li CG, 2023, 'Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations', IEEE Journal of Biomedical and Health Informatics, 27, pp. 1691 - 1700, http://dx.doi.org/10.1109/JBHI.2021.3126339

Al-Doghman F; Moustafa N; Khalil I; Sohrabi N; Tari Z; Zomaya AY, 2023, 'AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges', IEEE Transactions on Services Computing, 16, pp. 1485 - 1504, http://dx.doi.org/10.1109/TSC.2022.3155447

Sarhan M; Layeghy S; Moustafa N; Portmann M, 2023, 'Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection', Journal of Network and Systems Management, 31, http://dx.doi.org/10.1007/s10922-022-09691-3

Khan IA; Moustafa N; Pi D; Hussain Y; Khan NA, 2023, 'DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks', IEEE Transactions on Industrial Informatics, 19, pp. 3300 - 3309, http://dx.doi.org/10.1109/TII.2021.3108811

Bugshan N; Khalil I; Moustafa N; Rahman MS, 2023, 'Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications', IEEE Internet of Things Journal, 10, pp. 2821 - 2831, http://dx.doi.org/10.1109/JIOT.2021.3098980

Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2023, 'The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 2368 - 2381, http://dx.doi.org/10.1109/TITS.2021.3106378

Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816

Oseni A; Moustafa N; Creech G; Sohrabi N; Strelzoff A; Tari Z; Linkov I, 2023, 'An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 1000 - 1014, http://dx.doi.org/10.1109/TITS.2022.3188671

Moustafa N; Koroniotis N; Keshk M; Zomaya AY; Tari Z, 2023, 'Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions', IEEE Communications Surveys and Tutorials, 25, pp. 1775 - 1807, http://dx.doi.org/10.1109/COMST.2023.3280465

Yamany W; Moustafa N; Turnbull B, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 893 - 903, http://dx.doi.org/10.1109/TITS.2021.3130906

Abdel-Basset M; Moustafa N; Hawash H, 2023, 'Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach', IEEE Transactions on Industrial Informatics, 19, pp. 995 - 1005, http://dx.doi.org/10.1109/TII.2022.3165869

Yamany W; Keshk M; Moustafa N; Turnbull B, 2023, 'Swarm Optimisation-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, http://dx.doi.org/10.1109/TCE.2023.3319039

Alsaedi A; Tari Z; Mahmud R; Moustafa N; Mahmood A; Anwar A, 2023, 'USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data', IEEE Transactions on Dependable and Secure Computing, 20, pp. 724 - 739, http://dx.doi.org/10.1109/TDSC.2022.3143493

Khan IA; Moustafa N; Pi D; Haider W; Li B; Jolfaei A, 2022, 'An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 25469 - 25478, http://dx.doi.org/10.1109/TITS.2021.3105834

Akter M; Moustafa N; Lynar T; Razzak I, 2022, 'Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems', IEEE Journal of Biomedical and Health Informatics, 26, pp. 5805 - 5816, http://dx.doi.org/10.1109/JBHI.2022.3192648

Rahman MA; Mukta MY; Asyhari AT; Moustafa N; Patwary MN; Yousuf A; Razzak I; Gupta BB, 2022, 'Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 23771 - 23780, http://dx.doi.org/10.1109/TITS.2022.3203208

Abdel-Basset M; Moustafa N; Hawash H, 2022, 'Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach', IEEE Transactions on Industrial Informatics, 18, pp. 7920 - 7934, http://dx.doi.org/10.1109/TII.2022.3167663

Abdel-Basset M; Hawash H; Moustafa N, 2022, 'Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions', IEEE Consumer Electronics Magazine, 11, pp. 56 - 66, http://dx.doi.org/10.1109/MCE.2021.3117232


Back to profile page