Select Publications

Journal articles

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems

Moustafa N, 2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808

Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717

Radwan I; Moustafa N; Keating B; Choo KKR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002

Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430

Moustafa N; Slay J, 2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', , http://arxiv.org/abs/1711.02824v1

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974


Back to profile page