Select Publications

Books

Abdel-Basset M; Moustafa N; Hawash H; Zomaya AY, 2024, Explainable Artificial Intelligence for Trustworthy Internet of Things, The Institution of Engineering and Technology, http://dx.doi.org/10.1049/pbpc068e

Abdel-Basset M; Moustafa N; Hawash H; Tari Z, 2023, Responsible Graph Neural Networks, http://dx.doi.org/10.1201/9781003329701

Abdel-Basset M; Moustafa N; Hawash H, 2022, Deep learning approaches for security threats in IoT environments, http://dx.doi.org/10.1002/9781119884170

Moustafa N, 2022, Digital Forensics in the Era of Artificial Intelligence, CRC Press, http://dx.doi.org/10.1201/9781003278962

Ahmed M; Islam SR; Anwar A; Moustafa N; Pathan ASK, 2022, Preface

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface i

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface ii

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Deep Learning Techniques for IoT Security and Privacy, Springer International Publishing, http://dx.doi.org/10.1007/978-3-030-89025-4

Gallagher M; Moustafa N; Lakshika E, 2020, Preface

Book Chapters

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5

Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6

Moustafa N, 2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Mohamed H; Koroniotis N; Schiliro F; Moustafa N, 2025, 'IoT-CAD: A comprehensive Digital Forensics dataset for AI-based Cyberattack Attribution Detection methods in IoT environments', Ad Hoc Networks, 174, http://dx.doi.org/10.1016/j.adhoc.2025.103840

Masud MT; Keshk M; Moustafa N; Turnbull B; Susilo W, 2025, 'Vulnerability defence using hybrid moving target defence in Internet of Things systems', Computers and Security, 153, http://dx.doi.org/10.1016/j.cose.2025.104380

Masud MT; Koroniotis N; Keshk M; Turnbull B; Kermanshahi SK; Moustafa N, 2025, 'Generative fuzzer-driven vulnerability detection in the Internet of Things networks', Applied Soft Computing, 174, http://dx.doi.org/10.1016/j.asoc.2025.112973

Salim S; Moustafa N; Turnbull B, 2025, 'BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems', Ad Hoc Networks, 169, http://dx.doi.org/10.1016/j.adhoc.2025.103760

Pakana F; Sohrabi N; Dong H; Tari Z; Moustafa N, 2025, 'ERT: Data placement based on estimated response time for P2P storage systems', Journal of Parallel and Distributed Computing, 197, http://dx.doi.org/10.1016/j.jpdc.2024.105022

Ding W; Abdel-Basset M; Ali AM; Moustafa N, 2025, 'Large language models for cyber resilience: A comprehensive review, challenges, and future perspectives', Applied Soft Computing, 170, http://dx.doi.org/10.1016/j.asoc.2024.112663

Salim S; Moustafa N; Reisslein M, 2025, 'Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments', IEEE Communications Surveys and Tutorials, 27, pp. 372 - 425, http://dx.doi.org/10.1109/COMST.2024.3408277

Pasdar A; Koroniotis N; Keshk M; Moustafa N; Tari Z, 2025, 'Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems', IEEE Transactions on Sustainable Computing, 10, pp. 345 - 365, http://dx.doi.org/10.1109/TSUSC.2024.3443256

Masud MT; Keshk M; Moustafa N; Linkov I; Emge DK, 2025, 'Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things', IEEE Open Journal of the Communications Society, 6, pp. 2877 - 2906, http://dx.doi.org/10.1109/OJCOMS.2024.3413790

Mohamed H; Koroniotis N; Moustafa N; Schiliro F; Zomaya AY, 2025, 'Harnessing Federated Learning for Digital Forensics in IoT: A Survey and Introduction to the IoT-LF Framework', IEEE Open Journal of the Communications Society, 6, pp. 3161 - 3191, http://dx.doi.org/10.1109/OJCOMS.2024.3492919

Salim S; Moustafa N; Turnbull B, 2025, 'Privacy preservation of Internet of Things–integrated social networks: a survey and future challenges', International Journal of Web Information Systems, http://dx.doi.org/10.1108/IJWIS-04-2024-0120

Salim S; Moustafa N; Almorjan A, 2025, 'Responsible Deep-Federated-Learning-Based Threat Detection for Satellite Communications', IEEE Internet of Things Journal, 12, pp. 4807 - 4819, http://dx.doi.org/10.1109/JIOT.2025.3531884

Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z; Zomaya AY, 2025, 'VIFL: vulnerability identification using federated learning in the internet of things systems', Computing, 107, http://dx.doi.org/10.1007/s00607-024-01365-z

Akter M; Moustafa N; Turnbull B, 2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3

Moustafa N, 2024, 'GH-Twin: Graph Learning Empowered Hierarchical Digital Twin for Optimizing Self-Healing Networks', Sustainable Machine Intelligence Journal, 8, http://dx.doi.org/10.61356/smij.2024.8289

Abdel-Basset M; Hawash H; Moustafa N; Razzak I; Abd Elfattah M, 2024, 'Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach', Digital Communications and Networks, 10, pp. 404 - 415, http://dx.doi.org/10.1016/j.dcan.2022.12.013

Salim S; Moustafa N; Hassanian M; Ormod D; Slay J, 2024, 'Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications', IEEE Internet of Things Journal, 11, pp. 3853 - 3867, http://dx.doi.org/10.1109/JIOT.2023.3301626

Al-Hawawreh M; Moustafa N, 2024, 'Explainable deep learning for attack intelligence and combating cyber–physical attacks', Ad Hoc Networks, 153, http://dx.doi.org/10.1016/j.adhoc.2023.103329

Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2024, 'Feature extraction for machine learning-based intrusion detection in IoT networks', Digital Communications and Networks, 10, pp. 205 - 216, http://dx.doi.org/10.1016/j.dcan.2022.08.012

Yamany W; Keshk M; Moustafa N; Turnbull B, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039

Salim S; Turnbull B; Moustafa N, 2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463

Al-Hawawreh M; Moustafa N; Slay J, 2024, 'A threat intelligence framework for protecting smart satellite-based healthcare networks', Neural Computing and Applications, 36, pp. 15 - 35, http://dx.doi.org/10.1007/s00521-021-06441-5

Johnson N; Turnbull B; Reisslein M; Moustafa N, 2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387

Whitty MT; Moustafa N; Grobler M, 2024, 'Cybersecurity when working from home during COVID-19: considering the human factors', Journal of Cybersecurity, 10, http://dx.doi.org/10.1093/cybsec/tyae001

Hassanin M; Moustafa N; Razzak I; Tanveer M; Ormrod D; Slay J, 2024, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, 71, pp. 12475 - 12486, http://dx.doi.org/10.1109/TEM.2022.3194487

Issa W; Moustafa N; Turnbull B; Choo KKR, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879


Back to profile page