Select Publications

Journal articles

Asikuzzaman M; Mareen H; Moustafa N; Choo KKR; Pickering MR, 2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain', IEEE Access, 10, pp. 15681 - 15698, http://dx.doi.org/10.1109/ACCESS.2022.3146723

Johnson N; Turnbull B; Reisslein M; Moustafa N, 2022, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2022.3184387

Moustafa N; Khan IA; Hassanin M; Ormrod D; Pi D; Razzak I; Slay J, 2022, 'DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks', IEEE Transactions on Industrial Informatics, http://dx.doi.org/10.1109/TII.2022.3214652

Hassanin M; Moustafa N; Razzak I; Tanveer M; Ormrod D; Slay J, 2022, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, http://dx.doi.org/10.1109/TEM.2022.3194487

Debie E; Moustafa N; Vasilakos A, 2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2488 - 2500, http://dx.doi.org/10.1109/TDSC.2021.3060775

Booij TM; Chiscop I; Meeuwissen E; Moustafa N; Hartog FTHD; den Hartog F, 2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets', IEEE Internet of Things Journal, 9, pp. 485 - 496, http://dx.doi.org/10.1109/JIOT.2021.3085194

Chaudhry SA; Irshad A; Nebhen J; Bashir AK; Moustafa N; Al-Otaibi YD; Zikria YB, 2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT', Sustainable Cities and Society, 75, http://dx.doi.org/10.1016/j.scs.2021.103322

Li S; Shen W; Bilal M; Xu X; Dou W; Moustafa N, 2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing', Journal of Systems Architecture, 119, http://dx.doi.org/10.1016/j.sysarc.2021.102273

Moustafa N, 2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets', Sustainable Cities and Society, 72, pp. 102994, http://dx.doi.org/10.1016/j.scs.2021.102994

Ashraf J; Keshk M; Moustafa N; Abdel-Basset M; Khurshid H; Bakhshi AD; Mostafa RR, 2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041

Hassanin M; Radwan I; Moustafa N; Tahtali M; Kumar N, 2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231

Ashraf J; Bakhshi AD; Moustafa N; Khurshid H; Javed A; Beheshti A, 2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590

Akhter S; Shah S; Ahmed M; Moustafa N; Çavuşoğlu U; Zengin A, 2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua

Salim S; Turnbull B; Moustafa N, 2021, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2021.3134463

Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198

Abdel-Basset M; Gamal A; Moustafa N; Abdel-Monem A; El-Saber N, 2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675

Moustafa N; Hassan M; Choo K-KR; Lynar T; Camtepe S; Whitty M, 2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011

Gamal M; Abbas HM; Moustafa N; Sitnikova E; Sadek RA, 2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers, Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877

Abdel-Basset M; Moustafa N; Mohamed R; Elkomy OM; Abouhawwash M, 2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130

Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737

Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728

Ali I; Sallam K; Moustafa N; Chakrabortty R; Ryan M; Choo K-KR, 2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386

Al-Hawawreh M; Moustafa N; Garg S; Hossain S, 2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)

Pratim Ray P; Dash D; Moustafa N, 2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109

Haider W; Moustafa N; Keshk M; Fernandez A; Choo KKR; Wahab A, 2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906

Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434

Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140

Asharf J; Moustafa N; Khurshid H; Debie E; Haider W; Wahab A, 2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics (Switzerland), 9, http://dx.doi.org/10.3390/electronics9071177

Koroniotis N; Moustafa N; Sitnikova E, 2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems

Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715

Alsaedi A; Moustafa N; Tari Z; Mahmood A; Adna N Anwar , 2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems

Moustafa N, 2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808

Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717

Radwan I; Moustafa N; Keating B; Choo KKR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002

Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430

Moustafa N; Slay J, 2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis, http://arxiv.org/abs/1711.02824v1


Back to profile page