default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 161 matches
- 2024
- Rana Nour, Hossam El-Din Moustafa, Ehab H. Abdelhay, Mohamed Maher Ata:
Improved Unsupervised Deep Boltzmann Learning Approach for Accurate Hand Vein Recognition. IEEE Access 12: 18488-18507 (2024) - Muna Al-Hawawreh, Nour Moustafa:
Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Networks 153: 103329 (2024) - Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull:
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems. Cogn. Comput. 16(5): 2626-2641 (2024) - Monica T. Whitty, Nour Moustafa, Marthie Grobler:
Cybersecurity when working from home during COVID-19: considering the human factors. J. Cybersecur. 10(1) (2024) - Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Imran Razzak, Mohamed Abd Elfattah:
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach. Digit. Commun. Networks 10(2): 404-415 (2024) - Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann:
Feature extraction for machine learning-based intrusion detection in IoT networks. Digit. Commun. Networks 10(1): 205-216 (2024) - Wei-Ping Ding, Mohamed Abdel-Basset, Ahmed M. Ali, Nour Moustafa:
A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future. Eng. Appl. Artif. Intell. 138: 109451 (2024) - Sara Salim, Nour Moustafa, Mohamed Hassanian, David Ormod, Jill Slay:
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications. IEEE Internet Things J. 11(3): 3853-3867 (2024) - Muna Al-Hawawreh, Nour Moustafa, Jill Slay:
A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Comput. Appl. 36(1): 15-35 (2024) - Waleed Yamany, Marwa Keshk, Nour Moustafa, Benjamin P. Turnbull:
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks. IEEE Trans. Consumer Electron. 70(1): 1359-1369 (2024) - Nathan Johnson, Benjamin P. Turnbull, Martin Reisslein, Nour Moustafa:
CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification. IEEE Trans. Comput. Soc. Syst. 11(4): 4636-4648 (2024) - Sara Salim, Benjamin P. Turnbull, Nour Moustafa:
A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks. IEEE Trans. Comput. Soc. Syst. 11(4): 4681-4697 (2024) - Mohammed Hassanin, Nour Moustafa, Imran Razzak, M. Tanveer, David G. A. Ormrod, Jill Slay:
Dynamic Hypersphere Embedding Scale Against Adversarial Attacks. IEEE Trans. Engineering Management 71: 12475-12486 (2024) - Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 3772-3787 (2024) - Hasan Geren, Nasrin Sohrabi, Zahir Tari, Nour Moustafa:
A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge. ICDE 2024: 1520-1532 - Nour Moustafa, S. Hettich, S. D. Bay, Sebastián García, Agustin Parmisano, María José Erquiaga, Muhammad Dany AlFriki, Cut Alna Fadhilla, Rafael Kaliski:
AIoT Malware detection (Zeek preprocessed). IEEE DataPort, 2024 - Taishi Nakamura, Mayank Mishra, Simone Tedeschi, Yekun Chai, Jason T. Stillerman, Felix Friedrich, Prateek Yadav, Tanmay Laud, Minh Chien Vu, Terry Yue Zhuo, Diganta Misra, Ben Bogin, Xuan-Son Vu, Marzena Karpinska, Arnav Varma Dantuluri, Wojciech Kusa, Tommaso Furlanello, Rio Yokota, Niklas Muennighoff, Suhas Pai, Tosin P. Adewumi, Veronika Laippala, Xiaozhe Yao, Adalberto Junior, Alpay Ariyak, Aleksandr Drozd, Jordan Clive, Kshitij Gupta, Liangyu Chen, Qi Sun, Ken Tsui, Noah Persaud, Nour Moustafa-Fahmy, Tianlong Chen, Mohit Bansal, Nicolo Monti, Tai Dang, Ziyang Luo, Tien-Tung Bui, Roberto Navigli, Virendra Mehta, Matthew Blumberg, Victor May, Huu Nguyen, Sampo Pyysalo:
Aurora-M: The First Open Source Multilingual Language Model Red-teamed according to the U.S. Executive Order. CoRR abs/2404.00399 (2024) - Mohammed Hassanin, Nour Moustafa:
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions. CoRR abs/2405.14487 (2024) - 2023
- Nour Moustafa, Nickolaos Koroniotis, Marwa Keshk, Albert Y. Zomaya, Zahir Tari:
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions. IEEE Commun. Surv. Tutorials 25(3): 1775-1807 (2023) - Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari:
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 55(9): 191:1-191:43 (2023) - Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mohammad Saidur Rahman:
Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications. IEEE Internet Things J. 10(4): 2821-2831 (2023) - Marwa Keshk, Nickolaos Koroniotis, Nam Pham, Nour Moustafa, Benjamin P. Turnbull, Albert Y. Zomaya:
An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 639: 119000 (2023) - Tian Kang, Yingcheng Sun, Jae Hyun Kim, Casey N. Ta, Adler J. Perotte, Kayla Schiffer, Mutong Wu, Yang Zhao, Nour Moustafa-Fahmy, Yifan Peng, Chunhua Weng:
EvidenceMap: a three-level knowledge representation for medical evidence computation and comprehension. J. Am. Medical Informatics Assoc. 30(6): 1022-1031 (2023) - Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. J. Netw. Syst. Manag. 31(1): 3 (2023) - Reda M. Hussien, Amr A. Abohany, Nour Moustafa, Karam M. Sallam:
An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks. Neural Comput. Appl. 35(25): 18665-18680 (2023) - Theresa May Sobb, Benjamin P. Turnbull, Nour Moustafa:
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities. Sensors 23(17): 7391 (2023) - Abdullah Alsaedi, Zahir Tari, Md. Redowan Mahmud, Nour Moustafa, Abdun Mahmood, Adnan Anwar:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. IEEE Trans. Dependable Secur. Comput. 20(1): 724-739 (2023) - Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash:
Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. IEEE Trans. Ind. Informatics 19(1): 995-1005 (2023) - Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Yasir Hussain, Nauman Ali Khan:
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. IEEE Trans. Ind. Informatics 19(3): 3300-3309 (2023) - Muhammad Alsherbiny, Ibrahim Radwan, Nour Moustafa, Deep Jyoti Bhuyan, Muath El-Waisi, Dennis Chang, Chunguang Li:
Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations. IEEE J. Biomed. Health Informatics 27(4): 1691-1700 (2023)
skipping 131 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-13 16:14 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint