Select Publications

Books

Abdel-Basset M; Moustafa N; Hawash H; Tari Z, 2023, Responsible Graph Neural Networks, http://dx.doi.org/10.1201/9781003329701

Abdel-Basset M; Moustafa N; Hawash H, 2022, Deep learning approaches for security threats in IoT environments, http://dx.doi.org/10.1002/9781119884170

Ahmed M; Islam SR; Anwar A; Moustafa N; Pathan ASK, 2022, Preface

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface i

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface ii

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Deep Learning Techniques for IoT Security and Privacy, Springer International Publishing, http://dx.doi.org/10.1007/978-3-030-89025-4

Gallagher M; Moustafa N; Lakshika E, 2020, Preface

Book Chapters

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6

Moustafa N, 2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Akter M; Moustafa N; Turnbull B, 2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3

Abdel-Basset M; Hawash H; Moustafa N; Razzak I; Abd Elfattah M, 2024, 'Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach', Digital Communications and Networks, 10, pp. 404 - 415, http://dx.doi.org/10.1016/j.dcan.2022.12.013

Salim S; Moustafa N; Hassanian M; Ormod D; Slay J, 2024, 'Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications', IEEE Internet of Things Journal, 11, pp. 3853 - 3867, http://dx.doi.org/10.1109/JIOT.2023.3301626

Al-Hawawreh M; Moustafa N, 2024, 'Explainable deep learning for attack intelligence and combating cyber–physical attacks', Ad Hoc Networks, 153, http://dx.doi.org/10.1016/j.adhoc.2023.103329

Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2024, 'Feature extraction for machine learning-based intrusion detection in IoT networks', Digital Communications and Networks, 10, pp. 205 - 216, http://dx.doi.org/10.1016/j.dcan.2022.08.012

Yamany W; Keshk M; Moustafa N; Turnbull B, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039

Salim S; Turnbull B; Moustafa N, 2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463

Al-Hawawreh M; Moustafa N; Slay J, 2024, 'A threat intelligence framework for protecting smart satellite-based healthcare networks', Neural Computing and Applications, 36, pp. 15 - 35, http://dx.doi.org/10.1007/s00521-021-06441-5

Johnson N; Turnbull B; Reisslein M; Moustafa N, 2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387

Salim S; Moustafa N; Reisslein M, 2024, 'Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments', IEEE Communications Surveys and Tutorials, http://dx.doi.org/10.1109/COMST.2024.3408277

Pasdar A; Koroniotis N; Keshk M; Moustafa N; Tari Z, 2024, 'Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems', IEEE Transactions on Sustainable Computing, http://dx.doi.org/10.1109/TSUSC.2024.3443256

Whitty MT; Moustafa N; Grobler M, 2024, 'Cybersecurity when working from home during COVID-19: considering the human factors', Journal of Cybersecurity, 10, http://dx.doi.org/10.1093/cybsec/tyae001

Hassanin M; Moustafa N; Razzak I; Tanveer M; Ormrod D; Slay J, 2024, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, 71, pp. 12475 - 12486, http://dx.doi.org/10.1109/TEM.2022.3194487

Masud MT; Keshk M; Moustafa N; Linkov I; Emge DK, 2024, 'Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things', IEEE Open Journal of the Communications Society, http://dx.doi.org/10.1109/OJCOMS.2024.3413790

Issa W; Moustafa N; Turnbull B; Choo KKR, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879

Zhou Y; Ren Y; Yi M; Xiao Y; Tan Z; Moustafa N; Tian Z, 2023, 'CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships', IEEE Transactions on Sustainable Computing, 8, pp. 627 - 638, http://dx.doi.org/10.1109/TSUSC.2023.3240411

Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816

Sobb T; Turnbull B; Moustafa N, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391

Hussien RM; Abohany AA; Moustafa N; Sallam KM, 2023, 'An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks', Neural Computing and Applications, 35, pp. 18665 - 18680, http://dx.doi.org/10.1007/s00521-023-08695-7

Keshk M; Koroniotis N; Pham N; Moustafa N; Turnbull B; Zomaya AY, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000

Schiliro F; Moustafa N; Razzak I; Beheshti A, 2023, 'DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 7485 - 7493, http://dx.doi.org/10.1109/TITS.2022.3166631

Alsherbiny MA; Radwan I; Moustafa N; Bhuyan DJ; El-Waisi M; Chang D; Li CG, 2023, 'Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations', IEEE Journal of Biomedical and Health Informatics, 27, pp. 1691 - 1700, http://dx.doi.org/10.1109/JBHI.2021.3126339

Al-Doghman F; Moustafa N; Khalil I; Sohrabi N; Tari Z; Zomaya AY, 2023, 'AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges', IEEE Transactions on Services Computing, 16, pp. 1485 - 1504, http://dx.doi.org/10.1109/TSC.2022.3155447

Sarhan M; Layeghy S; Moustafa N; Portmann M, 2023, 'Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection', Journal of Network and Systems Management, 31, http://dx.doi.org/10.1007/s10922-022-09691-3

Khan IA; Moustafa N; Pi D; Hussain Y; Khan NA, 2023, 'DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks', IEEE Transactions on Industrial Informatics, 19, pp. 3300 - 3309, http://dx.doi.org/10.1109/TII.2021.3108811

Bugshan N; Khalil I; Moustafa N; Rahman MS, 2023, 'Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications', IEEE Internet of Things Journal, 10, pp. 2821 - 2831, http://dx.doi.org/10.1109/JIOT.2021.3098980

Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2023, 'The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 2368 - 2381, http://dx.doi.org/10.1109/TITS.2021.3106378

Moustafa N; Koroniotis N; Keshk M; Zomaya A; Tari Z, 2023, 'Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions', IEEE Communications Surveys and Tutorials, http://dx.doi.org/10.1109/COMST.2023.3280465


Back to profile page