Select Publications

Journal articles

Ashraf J; Keshk M; Moustafa N; Abdel-Basset M; Khurshid H; Bakhshi AD; Mostafa RR, 2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041

Hassanin M; Radwan I; Moustafa N; Tahtali M; Kumar N, 2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231

Ashraf J; Bakhshi AD; Moustafa N; Khurshid H; Javed A; Beheshti A, 2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590

Akhter S; Shah S; Ahmed M; Moustafa N; Çavuşoğlu U; Zengin A, 2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua

Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198

Abdel-Basset M; Gamal A; Moustafa N; Abdel-Monem A; El-Saber N, 2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675

Gamal M; Abbas HM; Moustafa N; Sitnikova E; Sadek RA, 2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877

Abdel-Basset M; Moustafa N; Mohamed R; Elkomy OM; Abouhawwash M, 2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130

Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737

Moustafa N; Hassan M; Choo K-KR; Lynar T; Camtepe S; Whitty M, 2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011

Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728

Ali I; Sallam K; Moustafa N; Chakrabortty R; Ryan M; Choo K-KR, 2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386

Al-Hawawreh M; Moustafa N; Garg S; Hossain S, 2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)

Pratim Ray P; Dash D; Moustafa N, 2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109

Haider W; Moustafa N; Keshk M; Fernandez A; Choo KKR; Wahab A, 2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906

Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability Switzerland, 12, http://dx.doi.org/10.3390/SU12166434

Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140

Asharf J; Moustafa N; Khurshid H; Debie E; Haider W; Wahab A, 2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics Switzerland, 9, http://dx.doi.org/10.3390/electronics9071177

Koroniotis N; Moustafa N; Sitnikova E, 2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems

Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715

Alsaedi A; Moustafa N; Tari Z; Mahmood A; Adna N Anwar , 2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems

Moustafa N, 2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808

Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717

Radwan I; Moustafa N; Keating B; Choo KKR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002

Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430

Moustafa N; Slay J, 2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', , http://arxiv.org/abs/1711.02824v1

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974

Conference Papers

Geren H; Sohrabi N; Tari Z; Moustafa N, 2024, 'A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge', in Proceedings International Conference on Data Engineering, pp. 1520 - 1532, http://dx.doi.org/10.1109/ICDE60146.2024.00125

Akter M; Moustafa N; Turnbull B, 2024, 'PEL: Privacy Embedded Learning in Smart Healthcare Systems', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788041

Masud MT; Keshk M; Moustafa N; Linkov I, 2023, 'An Explainable Intrusion Discovery Framework for Assessing Cyber Resilience in the Internet of Things Networks', in Proceedings of the Future Technologies Conference (FTC) 2023, Springer Nature, Vancouver, BC, Canada, pp. 199 - 215, presented at Future Technologies Conference (FTC) 2023, Vancouver, BC, Canada, 19 October 2023, http://dx.doi.org/10.1007/978-3-031-47448-4_15

Mohamed H; Koroniotis N; Moustafa N, 2023, 'Digital Forensics based on Federated Learning in IoT Environment', in ACM International Conference Proceeding Series, pp. 92 - 101, http://dx.doi.org/10.1145/3579375.3579387

Huang H; Sun N; Lin X; Moustafa N, 2022, 'Towards Generalized Deepfake Detection With Continual Learning On Limited New Data', in 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 1 - 7, presented at 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 November 2022 - 02 December 2022, http://dx.doi.org/10.1109/dicta56598.2022.10034569

Akter M; Moustafa N; Lynar T, 2022, 'Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems', in INFOCOM Wkshps 2022 IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798196

Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in Proceedings 2021 IEEE 20th International Conference on Trust Security and Privacy in Computing and Communications Trustcom 2021, pp. 887 - 894, http://dx.doi.org/10.1109/TrustCom53373.2021.00125

Yang S; Guo H; Moustafa N, 2021, 'Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network', in IEEE International Conference on Software Quality Reliability and Security Qrs, pp. 829 - 840, http://dx.doi.org/10.1109/QRS54544.2021.00092


Back to profile page