Dr Nour Moustafa

Dr Nour Moustafa

Senior Lecturer
UNSW Canberra
School of Systems & Computing

Dr Nour Moustafa is an ARC DECRA Fellow & Leader of the Intelligent Security Group at the School of Systems & Computing (SysCom), University of New South Wales (UNSW)'s UNSW Canberra, Australia. He was a Postdoctoral Fellow in Cyber Security at UNSW Canberra from June 2017 until February 2019. He received his PhD degree in the field of cyber security from UNSW in 2017. He obtained his bachelor’s and master’s degrees in information systems in 2009 and 2014, respectively, from the Faculty of Computer and Information, Helwan University, Egypt. His areas of interest include cyber security, in particular, network security, host- and network-intrusion detection systems, statistics, deep learning, and machine learning techniques. He is interested in designing and developing threat detection and forensic mechanisms for Industry 4.0 technology for identifying malicious activities from cloud computing, fog computing, IoT, and industrial control systems over virtual machines and physical systems. 

He leads the Intelligent Security Theme at UNSW Canberra Cyber, which focuses on developing novel artificial intelligence models for protecting smart systems against cyber threat attacks. He has been awarded the 2020  prestigious Australian Spitfire Memorial Defence Fellowship. He is also an ACM Distinguished Speaker and an IEEE Senior Member. He has published more than 75 research outputs in top-tier computing and security journals and conferences, such as IEEE Transactions on Forensics and Security, IEEE IoT, and IEEE Transactions on Industrial Informatics. He has served his academic community, as the guest associate editor of IEEE Transactions journals, including IEEE Transactions on Industrial Informatics, IEEE IoT Journal, as well as the journals: Ad Hoc Networks, IEEE Access, and Future Internet and Information Security Journal: A Global Perspective.  He has also served over seven conferences in leadership roles, involving vice-chair, session chair, Technical Program Committee (TPC) member and proceedings chair, including the 2020 IEEE TrustCom and 2020 32nd Australasian Joint Conference on Artificial Intelligence.   

His data sets for evaluating Cyber applications-based machine learning:  

Phone
+61 416 817 811
Location
Building 15, room 108
  • Books | 2023
    Abdel-Basset M; Moustafa N; Hawash H; Tari Z, 2023, Responsible Graph Neural Networks, http://dx.doi.org/10.1201/9781003329701
    Books | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Deep Learning Techniques for IoT Security and Privacy, Springer International Publishing, http://dx.doi.org/10.1007/978-3-030-89025-4
    Books | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface i
    Books | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, Preface ii
    Books | 2022
    Abdel-Basset M; Moustafa N; Hawash H, 2022, Deep learning approaches for security threats in IoT environments, http://dx.doi.org/10.1002/9781119884170
    Books | 2022
    Ahmed M; Islam SR; Anwar A; Moustafa N; Pathan ASK, 2022, Preface
    Books | 2020
    Gallagher M; Moustafa N; Lakshika E, 2020, Preface
  • Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5
    Book Chapters | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Ding W, 2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6
    Book Chapters | 2021
    Moustafa N, 2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4
    Book Chapters | 2020
    Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119
    Book Chapters | 2018
    Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13
    Book Chapters | 2018
    Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1
    Book Chapters | 2017
    Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5
  • Journal articles | 2024
    Abdel-Basset M; Hawash H; Moustafa N; Razzak I; Abd Elfattah M, 2024, 'Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach', Digital Communications and Networks, 10, pp. 404 - 415, http://dx.doi.org/10.1016/j.dcan.2022.12.013
    Journal articles | 2024
    Akter M; Moustafa N; Turnbull B, 2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3
    Journal articles | 2024
    Al-Hawawreh M; Moustafa N; Slay J, 2024, 'A threat intelligence framework for protecting smart satellite-based healthcare networks', Neural Computing and Applications, 36, pp. 15 - 35, http://dx.doi.org/10.1007/s00521-021-06441-5
    Journal articles | 2024
    Al-Hawawreh M; Moustafa N, 2024, 'Explainable deep learning for attack intelligence and combating cyber–physical attacks', Ad Hoc Networks, 153, http://dx.doi.org/10.1016/j.adhoc.2023.103329
    Journal articles | 2024
    Hassanin M; Moustafa N; Razzak I; Tanveer M; Ormrod D; Slay J, 2024, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, 71, pp. 12475 - 12486, http://dx.doi.org/10.1109/TEM.2022.3194487
    Journal articles | 2024
    Issa W; Moustafa N; Turnbull B; Choo KKR, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879
    Journal articles | 2024
    Johnson N; Turnbull B; Reisslein M; Moustafa N, 2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387
    Journal articles | 2024
    Masud MT; Keshk M; Moustafa N; Linkov I; Emge DK, 2024, 'Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things', IEEE Open Journal of the Communications Society, http://dx.doi.org/10.1109/OJCOMS.2024.3413790
    Journal articles | 2024
    Pasdar A; Koroniotis N; Keshk M; Moustafa N; Tari Z, 2024, 'Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems', IEEE Transactions on Sustainable Computing, http://dx.doi.org/10.1109/TSUSC.2024.3443256
    Journal articles | 2024
    Salim S; Moustafa N; Hassanian M; Ormod D; Slay J, 2024, 'Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications', IEEE Internet of Things Journal, 11, pp. 3853 - 3867, http://dx.doi.org/10.1109/JIOT.2023.3301626
    Journal articles | 2024
    Salim S; Moustafa N; Reisslein M, 2024, 'Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments', IEEE Communications Surveys and Tutorials, http://dx.doi.org/10.1109/COMST.2024.3408277
    Journal articles | 2024
    Salim S; Turnbull B; Moustafa N, 2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463
    Journal articles | 2024
    Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2024, 'Feature extraction for machine learning-based intrusion detection in IoT networks', Digital Communications and Networks, 10, pp. 205 - 216, http://dx.doi.org/10.1016/j.dcan.2022.08.012
    Journal articles | 2024
    Whitty MT; Moustafa N; Grobler M, 2024, 'Cybersecurity when working from home during COVID-19: considering the human factors', Journal of Cybersecurity, 10, http://dx.doi.org/10.1093/cybsec/tyae001
    Journal articles | 2024
    Yamany W; Keshk M; Moustafa N; Turnbull B, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039
    Journal articles | 2023
    Abdel-Basset M; Moustafa N; Hawash H, 2023, 'Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach', IEEE Transactions on Industrial Informatics, 19, pp. 995 - 1005, http://dx.doi.org/10.1109/TII.2022.3165869
    Journal articles | 2023
    Al-Doghman F; Moustafa N; Khalil I; Sohrabi N; Tari Z; Zomaya AY, 2023, 'AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges', IEEE Transactions on Services Computing, 16, pp. 1485 - 1504, http://dx.doi.org/10.1109/TSC.2022.3155447
    Journal articles | 2023
    Alsaedi A; Tari Z; Mahmud R; Moustafa N; Mahmood A; Anwar A, 2023, 'USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data', IEEE Transactions on Dependable and Secure Computing, 20, pp. 724 - 739, http://dx.doi.org/10.1109/TDSC.2022.3143493
    Journal articles | 2023
    Alsherbiny MA; Radwan I; Moustafa N; Bhuyan DJ; El-Waisi M; Chang D; Li CG, 2023, 'Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations', IEEE Journal of Biomedical and Health Informatics, 27, pp. 1691 - 1700, http://dx.doi.org/10.1109/JBHI.2021.3126339
    Journal articles | 2023
    Bugshan N; Khalil I; Moustafa N; Rahman MS, 2023, 'Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications', IEEE Internet of Things Journal, 10, pp. 2821 - 2831, http://dx.doi.org/10.1109/JIOT.2021.3098980
    Journal articles | 2023
    Hussien RM; Abohany AA; Moustafa N; Sallam KM, 2023, 'An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks', Neural Computing and Applications, 35, pp. 18665 - 18680, http://dx.doi.org/10.1007/s00521-023-08695-7
    Journal articles | 2023
    Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816
    Journal articles | 2023
    Keshk M; Koroniotis N; Pham N; Moustafa N; Turnbull B; Zomaya AY, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000
    Journal articles | 2023
    Khan IA; Moustafa N; Pi D; Hussain Y; Khan NA, 2023, 'DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks', IEEE Transactions on Industrial Informatics, 19, pp. 3300 - 3309, http://dx.doi.org/10.1109/TII.2021.3108811
    Journal articles | 2023
    Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2023, 'The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 2368 - 2381, http://dx.doi.org/10.1109/TITS.2021.3106378
    Journal articles | 2023
    Moustafa N; Koroniotis N; Keshk M; Zomaya AY; Tari Z, 2023, 'Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions', IEEE Communications Surveys and Tutorials, 25, pp. 1775 - 1807, http://dx.doi.org/10.1109/COMST.2023.3280465
    Journal articles | 2023
    Oseni A; Moustafa N; Creech G; Sohrabi N; Strelzoff A; Tari Z; Linkov I, 2023, 'An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 1000 - 1014, http://dx.doi.org/10.1109/TITS.2022.3188671
    Journal articles | 2023
    Sarhan M; Layeghy S; Moustafa N; Portmann M, 2023, 'Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection', Journal of Network and Systems Management, 31, http://dx.doi.org/10.1007/s10922-022-09691-3
    Journal articles | 2023
    Schiliro F; Moustafa N; Razzak I; Beheshti A, 2023, 'DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 7485 - 7493, http://dx.doi.org/10.1109/TITS.2022.3166631
    Journal articles | 2023
    Sobb T; Turnbull B; Moustafa N, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391
    Journal articles | 2023
    Yamany W; Moustafa N; Turnbull B, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 893 - 903, http://dx.doi.org/10.1109/TITS.2021.3130906
    Journal articles | 2023
    Zhou Y; Ren Y; Yi M; Xiao Y; Tan Z; Moustafa N; Tian Z, 2023, 'CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships', IEEE Transactions on Sustainable Computing, 8, pp. 627 - 638, http://dx.doi.org/10.1109/TSUSC.2023.3240411
    Journal articles | 2022
    Abdel-Basset M; Gamal A; Moustafa N; Askar SS; Abouhawwash M, 2022, 'A Risk Assessment Model for Cyber-Physical Water and Wastewater Systems: Towards Sustainable Development', Sustainability (Switzerland), 14, http://dx.doi.org/10.3390/su14084480
    Journal articles | 2022
    Abdel-Basset M; Hawash H; Moustafa N; Mohammad N, 2022, 'H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information', IEEE Internet of Things Journal, 9, pp. 10010 - 10021, http://dx.doi.org/10.1109/JIOT.2021.3117909
    Journal articles | 2022
    Abdel-Basset M; Hawash H; Moustafa N, 2022, 'Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions', IEEE Consumer Electronics Magazine, 11, pp. 56 - 66, http://dx.doi.org/10.1109/MCE.2021.3117232
    Journal articles | 2022
    Abdel-Basset M; Moustafa N; Hawash H; Razzak I; Sallam KM; Elkomy OM, 2022, 'Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 2523 - 2537, http://dx.doi.org/10.1109/TITS.2021.3119968
    Journal articles | 2022
    Abdel-Basset M; Moustafa N; Hawash H, 2022, 'Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach', IEEE Transactions on Industrial Informatics, 18, pp. 7920 - 7934, http://dx.doi.org/10.1109/TII.2022.3167663
    Journal articles | 2022
    Ahmed M; Moustafa N; Suaib Akhter AFM; Razzak I; Surid E; Anwar A; Shahen Shah AFM; Zengin A, 2022, 'A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19624 - 19633, http://dx.doi.org/10.1109/TITS.2021.3115245
    Journal articles | 2022
    Akter M; Moustafa N; Lynar T; Razzak I, 2022, 'Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems', IEEE Journal of Biomedical and Health Informatics, 26, pp. 5805 - 5816, http://dx.doi.org/10.1109/JBHI.2022.3192648
    Journal articles | 2022
    Asikuzzaman M; Mareen H; Moustafa N; Choo KKR; Pickering MR, 2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain', IEEE Access, 10, pp. 15681 - 15698, http://dx.doi.org/10.1109/ACCESS.2022.3146723
    Journal articles | 2022
    Booij TM; Chiscop I; Meeuwissen E; Moustafa N; Hartog FTHD; den Hartog F, 2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets', IEEE Internet of Things Journal, 9, pp. 485 - 496, http://dx.doi.org/10.1109/JIOT.2021.3085194
    Journal articles | 2022
    Bugshan N; Khalil I; Moustafa N; Almashor M; Abuadbba A, 2022, 'Radial Basis Function Network with Differential Privacy', Future Generation Computer Systems, 127, pp. 473 - 486, http://dx.doi.org/10.1016/j.future.2021.09.013
    Journal articles | 2022
    Debie E; Moustafa N; Vasilakos A, 2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2488 - 2500, http://dx.doi.org/10.1109/TDSC.2021.3060775
    Journal articles | 2022
    Ding W; Abdel-Basset M; Hawash H; Mostafa N, 2022, 'Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication', Information Sciences, 597, pp. 144 - 165, http://dx.doi.org/10.1016/j.ins.2022.03.046
    Journal articles | 2022
    Hassanin M; Moustafa N; Tahtali M; Choo KKR, 2022, 'Rethinking maximum-margin softmax for adversarial robustness', Computers and Security, 116, http://dx.doi.org/10.1016/j.cose.2022.102640
    Journal articles | 2022
    Jagatheesaperumal SK; Mishra P; Moustafa N; Chauhan R, 2022, 'A holistic survey on the use of emerging technologies to provision secure healthcare solutions', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107691
    Journal articles | 2022
    Khan IA; Moustafa N; Pi D; Haider W; Li B; Jolfaei A, 2022, 'An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 25469 - 25478, http://dx.doi.org/10.1109/TITS.2021.3105834
    Journal articles | 2022
    Khan IA; Moustafa N; Pi D; Sallam KM; Zomaya AY; Li B, 2022, 'A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks', IEEE Internet of Things Journal, 9, pp. 11604 - 11613, http://dx.doi.org/10.1109/JIOT.2021.3130156
    Journal articles | 2022
    Khan IA; Moustafa N; Razzak I; Tanveer M; Pi D; Pan Y; Ali BS, 2022, 'XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks', Future Generation Computer Systems, 127, pp. 181 - 193, http://dx.doi.org/10.1016/j.future.2021.09.010
    Journal articles | 2022
    Koroniotis N; Moustafa N; Slay J, 2022, 'A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107745
    Journal articles | 2022
    Moustafa N; Choo KKR; Abu-Mahfouz AM, 2022, 'Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System', IEEE Transactions on Industrial Informatics, 18, pp. 1892 - 1895, http://dx.doi.org/10.1109/TII.2021.3111028
    Journal articles | 2022
    Moustafa N; Khan IA; Hassanin M; Ormrod D; Pi D; Razzak I; Slay J, 2022, 'DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks', IEEE Transactions on Industrial Informatics, http://dx.doi.org/10.1109/TII.2022.3214652
    Journal articles | 2022
    Qayyum A; Razzak I; Moustafa N; Mazher M, 2022, 'Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children', Image and Vision Computing, 119, pp. 104375, http://dx.doi.org/10.1016/j.imavis.2022.104375
    Journal articles | 2022
    Rahim MA; Rahman MA; Rahman MM; Zaman N; Moustafa N; Razzak I, 2022, 'An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health', IEEE Transactions on Green Communications and Networking, 6, pp. 1298 - 1306, http://dx.doi.org/10.1109/TGCN.2022.3179350
    Journal articles | 2022
    Rahman MA; Mukta MY; Asyhari AT; Moustafa N; Patwary MN; Yousuf A; Razzak I; Gupta BB, 2022, 'Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 23771 - 23780, http://dx.doi.org/10.1109/TITS.2022.3203208
    Journal articles | 2022
    Rahman MA; Rahim MA; Rahman MM; Moustafa N; Razzak I; Ahmad T; Patwary MN, 2022, 'A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19727 - 19742, http://dx.doi.org/10.1109/TITS.2021.3138255
    Journal articles | 2022
    Rahman MS; Khalil I; Moustafa N; Kalapaaking AP; Bouras A, 2022, 'A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems', IEEE Transactions on Industrial Informatics, 18, pp. 5007 - 5017, http://dx.doi.org/10.1109/TII.2021.3105527
    Journal articles | 2022
    Razzak I; Moustafa N; Mumtaz S; Xu G, 2022, 'One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data', International Journal of Intelligent Systems, 37, pp. 4515 - 4536, http://dx.doi.org/10.1002/int.22729
    Journal articles | 2022
    Salim S; Moustafa N; Turnbull B; Razzak I, 2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks', ACM Transactions on Multimedia Computing, Communications and Applications, 18, http://dx.doi.org/10.1145/3537899
    Journal articles | 2022
    Salim S; Turnbull B; Moustafa N, 2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786
    Journal articles | 2022
    Weinger B; Kim J; Sim A; Nakashima M; Moustafa N; Wu KJ, 2022, 'Enhancing IoT anomaly detection performance for federated learning', Digital Communications and Networks, 8, pp. 314 - 323, http://dx.doi.org/10.1016/j.dcan.2022.02.007
    Journal articles | 2021
    Abdel-Basset M; Gamal A; Moustafa N; Abdel-Monem A; El-Saber N, 2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675
    Journal articles | 2021
    Abdel-Basset M; Moustafa N; Mohamed R; Elkomy OM; Abouhawwash M, 2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130
    Journal articles | 2021
    Akhter S; Shah S; Ahmed M; Moustafa N; Çavuşoğlu U; Zengin A, 2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua
    Journal articles | 2021
    Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
    Journal articles | 2021
    Ashraf J; Bakhshi AD; Moustafa N; Khurshid H; Javed A; Beheshti A, 2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882
    Journal articles | 2021
    Ashraf J; Keshk M; Moustafa N; Abdel-Basset M; Khurshid H; Bakhshi AD; Mostafa RR, 2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041
    Journal articles | 2021
    Chaudhry SA; Irshad A; Nebhen J; Bashir AK; Moustafa N; Al-Otaibi YD; Zikria YB, 2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT', Sustainable Cities and Society, 75, http://dx.doi.org/10.1016/j.scs.2021.103322
    Journal articles | 2021
    Gamal M; Abbas HM; Moustafa N; Sitnikova E; Sadek RA, 2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers, Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877
    Journal articles | 2021
    Hassanin M; Radwan I; Moustafa N; Tahtali M; Kumar N, 2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231
    Journal articles | 2021
    Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
    Journal articles | 2021
    Li S; Shen W; Bilal M; Xu X; Dou W; Moustafa N, 2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing', Journal of Systems Architecture, 119, http://dx.doi.org/10.1016/j.sysarc.2021.102273
    Journal articles | 2021
    Moustafa N; Hassan M; Choo K-KR; Lynar T; Camtepe S; Whitty M, 2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011
    Journal articles | 2021
    Moustafa N, 2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets', Sustainable Cities and Society, 72, pp. 102994, http://dx.doi.org/10.1016/j.scs.2021.102994
    Journal articles | 2021
    Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
    Journal articles | 2020
    Al-Hawawreh M; Moustafa N; Garg S; Hossain S, 2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
    Journal articles | 2020
    Ali I; Sallam K; Moustafa N; Chakrabortty R; Ryan M; Choo K-KR, 2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386
    Journal articles | 2020
    Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
    Journal articles | 2020
    Alsaedi A; Moustafa N; Tari Z; Mahmood A; Adna N Anwar , 2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862
    Journal articles | 2020
    Asharf J; Moustafa N; Khurshid H; Debie E; Haider W; Wahab A, 2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics (Switzerland), 9, http://dx.doi.org/10.3390/electronics9071177
    Journal articles | 2020
    Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434
    Journal articles | 2020
    Haider W; Moustafa N; Keshk M; Fernandez A; Choo KKR; Wahab A, 2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906
    Journal articles | 2020
    Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
    Journal articles | 2020
    Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728
    Journal articles | 2020
    Koroniotis N; Moustafa N; Sitnikova E, 2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems
    Journal articles | 2020
    Pratim Ray P; Dash D; Moustafa N, 2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109
    Journal articles | 2020
    Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
    Journal articles | 2020
    Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
    Journal articles | 2019
    Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
    Journal articles | 2019
    Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
    Journal articles | 2019
    Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657
    Journal articles | 2019
    Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
    Journal articles | 2019
    Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717
    Journal articles | 2019
    Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808
    Journal articles | 2019
    Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006
    Journal articles | 2019
    Moustafa N, 2019, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1
    Journal articles | 2019
    Radwan I; Moustafa N; Keating B; Choo KKR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050
    Journal articles | 2018
    Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, https://www.sciencedirect.com/science/article/pii/S2214212617306002
    Journal articles | 2018
    Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
    Journal articles | 2018
    Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
    Journal articles | 2018
    Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
    Journal articles | 2018
    Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, 6, pp. 245 - 256, http://dx.doi.org/10.1109/TSUSC.2018.2808430
    Journal articles | 2018
    Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981
    Journal articles | 2017
    Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166
    Journal articles | 2017
    Moustafa N; Slay J, 2017, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', , http://arxiv.org/abs/1711.02824v1
    Journal articles | 2016
    Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974
  • Working Papers | 2021
    AKL AMM; Sallam K; Chakrabortty R; Moustafa N; Ryan M; Raymond K-K, 2021, A Novel Multi-level Optimization Framework forEnhancing Cyber-Physical Defenses in Smart PowerSystems, http://dx.doi.org
  • Conference Papers | 2024
    Geren H; Sohrabi N; Tari Z; Moustafa N, 2024, 'A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge', in Proceedings - International Conference on Data Engineering, pp. 1520 - 1532, http://dx.doi.org/10.1109/ICDE60146.2024.00125
    Conference Papers | 2023
    Masud MT; Keshk M; Moustafa N; Linkov I, 2023, 'An Explainable Intrusion Discovery Framework for Assessing Cyber Resilience in the Internet of Things Networks', in Proceedings of the Future Technologies Conference (FTC) 2023, Springer Nature, Vancouver, BC, Canada, pp. 199 - 215, presented at Future Technologies Conference (FTC) 2023, Vancouver, BC, Canada, 19 October 2023, http://dx.doi.org/10.1007/978-3-031-47448-4_15
    Conference Papers | 2023
    Mohamed H; Koroniotis N; Moustafa N, 2023, 'Digital Forensics based on Federated Learning in IoT Environment', in ACM International Conference Proceeding Series, pp. 92 - 101, http://dx.doi.org/10.1145/3579375.3579387
    Conference Papers | 2022
    Akter M; Moustafa N; Lynar T, 2022, 'Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798196
    Conference Papers | 2022
    Huang H; Sun N; Lin X; Moustafa N, 2022, 'Towards Generalized Deepfake Detection With Continual Learning On Limited New Data', in 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 1 - 7, presented at 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 November 2022 - 02 December 2022, http://dx.doi.org/10.1109/dicta56598.2022.10034569
    Preprints | 2022
    Sarhan M; Layeghy S; Moustafa N; Portmann M, 2022, Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection, , http://dx.doi.org/10.21203/rs.3.rs-1631421/v1
    Conference Papers | 2021
    Ashraf J; Moustafa N; Bukhshi AD; Javed A, 2021, 'Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques', in Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW, pp. 46 - 52, http://dx.doi.org/10.1109/EDOCW52865.2021.00031
    Conference Papers | 2021
    Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, pp. 887 - 894, http://dx.doi.org/10.1109/TrustCom53373.2021.00125
    Preprints | 2021
    Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments, , http://dx.doi.org/10.48550/arxiv.2109.09259
    Preprints | 2021
    Oseni A; Moustafa N; Janicke H; Liu P; Tari Z; Vasilakos A, 2021, Security and Privacy for Artificial Intelligence: Opportunities and Challenges, http://dx.doi.org/10.48550/arxiv.2102.04661
    Preprints | 2021
    Sarhan M; Layeghy S; Moustafa N; Gallagher M; Portmann M, 2021, Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks, , http://dx.doi.org/10.48550/arxiv.2108.12722
    Conference Papers | 2021
    Sarhan M; Layeghy S; Moustafa N; Portmann M, 2021, 'NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 117 - 135, http://dx.doi.org/10.1007/978-3-030-72802-1_9
    Conference Papers | 2021
    Yang S; Guo H; Moustafa N, 2021, 'Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 829 - 840, http://dx.doi.org/10.1109/QRS54544.2021.00092
    Preprints | 2021
    Yang S; Guo H; Moustafa N, 2021, Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network, http://dx.doi.org/10.48550/arxiv.2105.09157
    Conference Papers | 2020
    Alkadi O; Moustafa N; Turnbull B, 2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
    Conference Papers | 2020
    Debie E; Moustafa N; Whitty M, 2020, 'A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals', in IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, IEEE, Glasgow, United kingdom, presented at IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, Glasgow, United kingdom, 19 July 2020 - 24 July 2020
    Conference Papers | 2020
    Hassan M; Moustafa N; Sitnikova E; Turnbull B; Vatsalan D, 2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
    Conference Papers | 2020
    Hassanin M; Moustafa N; Tahtali M, 2020, 'A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models', Canberra, Australia, presented at The 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 04 December 2020
    Preprints | 2020
    Hassanin M; Moustafa N; Tahtali M, 2020, A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models, http://dx.doi.org/10.48550/arxiv.2012.04734
    Preprints | 2020
    Hassanin M; Radwan I; Moustafa N; Tahtali M; Kumar N, 2020, Mitigating the Impact of Adversarial Attacks in Very Deep Networks, http://dx.doi.org/10.48550/arxiv.2012.04750
    Conference Papers | 2020
    Koroniotis N; Moustafa N, 2020, 'Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework', Sydney, Australia, presented at 7th International Conference on Security and its Applications (CNSA 2020), Sydney, Australia, 28 March 2020 - 29 March 2020
    Conference Papers | 2020
    Moustafa N; Ahmed M; Ahmed S, 2020, 'Data Analytics-enabled Intrusion Detection: Evaluations of Linux ToN_IoT Datasets', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 727 - 735, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00100
    Conference Papers | 2020
    Moustafa N; Hassan M; Debie E; Janicke H, 2020, 'Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 848 - 855, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00114
    Conference Papers | 2020
    Moustafa N; Jolfaei A, 2020, 'Autonomous detection of malicious events using machine learning models in drone networks', in DroneCom 2020 - Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, pp. 61 - 66, http://dx.doi.org/10.1145/3414045.3415951
    Preprints | 2020
    Moustafa N; Keshk M; Debie E; Janicke H, 2020, Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications, , http://dx.doi.org/10.48550/arxiv.2010.08522
    Conference Papers | 2020
    Moustafa N; Salim S; Turnbull B, 2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
    Preprints | 2020
    Sarhan M; Layeghy S; Moustafa N; Portmann M, 2020, NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems, http://dx.doi.org/10.48550/arxiv.2011.09144
    Conference Papers | 2020
    Schiliro F; Moustafa N; Beheshti A, 2020, 'Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things', Fiji- Virtual Conference, presented at IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji- Virtual Conference, 14 December 2020 - 16 December 2020
    Conference Papers | 2020
    Weinge B; Kim J; Sim A; Nakashima M; Moustafa N; Wu J, 2020, 'Enhancing IoT Anomaly Detection Performance for Federated Learning', IEEE, Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020 - 19 December 2020, http://dx.doi.org/10.1109/MSN50589.2020.00045
    Conference Papers | 2020
    Wu P; Guo H; Moustafa N, 2020, 'Pelican: A Deep Residual Network for Network Intrusion Detection', in Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, pp. 55 - 62, http://dx.doi.org/10.1109/DSN-W50199.2020.00018
    Preprints | 2020
    Wu P; Guo H; Moustafa N, 2020, Pelican: A Deep Residual Network for Network Intrusion Detection, http://dx.doi.org/10.48550/arxiv.2001.08523
    Conference Papers | 2020
    Wu P; Moustafa N; Yang S; Guo H, 2020, 'Densely Connected Residual Network for Attack Recognition', in Wang GJ; Ko R; Bhuiyan MZA; Pan Y (eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Institute of Electrical and Electronics Engineers (IEEE), Guangzhou, China, pp. 233 - 242, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020 - 01 January 2021, http://dx.doi.org/10.1109/TrustCom50675.2020.00042
    Conference Papers | 2020
    schiliro F; Beheshti A; Moustafa N, 2020, 'A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing', Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 03 September 2020 - 04 March 2020
    Conference Proceedings (Editor of) | 2020
    Gallagher M; Moustafa N; Lakshika E, (eds.), 2020, 'AI 2020: Advances in Artificial Intelligence - 33rd Australasian Joint Conference, AI 2020, Canberra, ACT, Australia, November 29-30, 2020, Proceedings', Springer, Vol. 12576
    Conference Papers | 2019
    Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
    Preprints | 2018
    Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2018, Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset, http://dx.doi.org/10.48550/arxiv.1811.00701
    Conference Papers | 2018
    Monks K; Sitnikova E; Moustafa N, 2018, 'Cyber intrusion detection in operations of bulk handling ports', in Josang A (ed.), European Conference on Information Warfare and Security, ECCWS, Academic Conferences and Publishing International Limited, Oslo, Norway, pp. 307 - 316, presented at 17th European Conference on Cyber Warfare and Security ECCWS 2018, Oslo, Norway, 28 June 2018 - 29 June 2018, http://dx.doi.org/10.26190/unsworks/27235
    Conference Papers | 2018
    Moustafa N; Turnbull B; Choo K-KR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', Bellevue, Washington, USA, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023
    Conference Papers | 2018
    Wilson SW; Moustafa N; Sitnikova E, 2018, 'A Digital Identity Stack to Improve Privacy in the IoT', in IEEE 4th World Forum on Internet of Things, IEEE, Singapore, pp. 25 - 29, presented at IEEE 4th World Forum on Internet of Things, Singapore, 05 February 2018 - 08 February 2018, http://dx.doi.org/10.1109/WF-IoT.2018.8355199
    Conference Papers | 2017
    Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812
    Conference Papers | 2017
    Hassan MM; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', Canberra, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017
    Preprints | 2017
    Keshk M; Moustafa N; Sitnikova E; Creech G, 2017, Privacy Preservation Intrusion Detection Technique for SCADA Systems, , http://dx.doi.org/10.48550/arxiv.1711.02828
    Conference Papers | 2017
    Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2017, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', Springer International Publishing, Melbourne, Australia, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/towards-developing-network-forensic-mechanism-for-botnet-activit/15746852
    Preprints | 2017
    Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2017, Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques, , http://dx.doi.org/10.48550/arxiv.1711.02825
    Conference Papers | 2017
    Marsden T; Moustafa N; Sitnikova E; Creech G, 2017, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Hu J; Khalil I; Tari Z; Wen S (eds.), Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28
    Preprints | 2017
    Marsden T; Moustafa N; Sitnikova E; Creech G, 2017, Probability Risk Identification Based Intrusion Detection System for SCADA Systems, , http://dx.doi.org/10.48550/arxiv.1711.02826
    Conference Papers | 2017
    Moustafa N; Creech G; Sitnikova E; Hassan M, 2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', Canberra, Australia, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017
    Preprints | 2017
    Moustafa N; Creech G; Sitnikova E; Keshk M, 2017, Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing, , http://dx.doi.org/10.48550/arxiv.1711.02829
    Preprints | 2017
    Moustafa N; Slay J, 2017, A hybrid feature selection for network intrusion detection systems: Central points, , http://dx.doi.org/10.48550/arxiv.1707.05505
    Preprints | 2017
    Moustafa N; Slay J, 2017, RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis, , http://dx.doi.org/10.48550/arxiv.1711.02824
    Conference Papers | 2017
    Moustafa NM; Creech GC; SLAY JS, 2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.), School of Computer Engineering, KIIT University, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
    Conference Papers | 2017
    Moustafa NM; Creech GC; Slay JS, 2017, 'Flow Aggregator Module for Analysing Network Traffic', in Das HD (ed.), International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
    Theses / Dissertations | 2017
    Moustafa NM, 2017, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, http://handle.unsw.edu.au/1959.4/58748
    Conference Papers | 2015
    Moustafa N; Slay J, 2015, 'A hybrid feature selection for network intrusion detection systems: Central points', in Security Research Institute, Edith Cowan University, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57a84d4fbefbb
    Conference Papers | 2015
    Moustafa N; Slay J, 2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212
    Conference Papers | 2015
    Moustafa N; Slay J, 2015, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, Kyoto, Japan, pp. 25 - 31, presented at 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan, 05 November 2015 - 05 November 2015, http://ieeexplore.ieee.org/document/7809531/
    Conference Papers | 2015
    Moustafa N; Slay J, 2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, http://dx.doi.org/10.1109/MilCIS.2015.7348942
    Conference Papers | 2015
    Moustafa NM; Slay J, 2015, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 November 2015 - 05 November 2015, http://dx.doi.org/10.13140/RG.2.1.2264.4883