Select Publications

Book Chapters

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6

Moustafa N, 2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5


Back to profile page