A deep learning approach for extracting attributes of ABAC policies M Alohaly, H Takabi, E Blanco Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018 | 49 | 2018 |
Brain computer interface (BCI) applications: Privacy threats and countermeasures H Takabi, A Bhalotiya, M Alohaly 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 36 | 2016 |
Automated extraction of attributes from natural language attribute-based access control (ABAC) policies M Alohaly, H Takabi, E Blanco Cybersecurity 2 (1), 2, 2019 | 30 | 2019 |
Better privacy indicators: a new approach to quantification of privacy policies M Alohaly, H Takabi Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 25 | 2016 |
Enhancing spam message classification and detection using transformer-based embedding and ensemble learning A Ghourabi, M Alohaly Sensors 23 (8), 3861, 2023 | 23 | 2023 |
A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach Q Abu Al-Haija, M Alohaly, A Odeh Sensors 23 (7), 3489, 2023 | 22 | 2023 |
Performance and scalability analysis of ethereum and hyperledger fabric Y Ucbas, A Eleyan, M Hammoudeh, M Alohaly IEEE Access, 2023 | 20 | 2023 |
Towards an automated extraction of abac constraints from natural language policies M Alohaly, H Takabi, E Blanco ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 20 | 2019 |
Integrating cyber deception into attribute-based access control (ABAC) for insider threat detection M Alohaly, O Balogun, D Takabi IEEE Access 10, 108965-108978, 2022 | 12 | 2022 |
When do changes induce software vulnerabilities? M Alohaly, H Takabi 2017 IEEE 3rd International conference on collaboration and internet …, 2017 | 9 | 2017 |
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF A Sadiq, HJ Syed, AA Ansari, AO Ibrahim, M Alohaly, M Elsadig Applied Sciences 13 (8), 4700, 2023 | 5 | 2023 |
A Semantic, Syntactic, And Context-Aware Natural Language Adversarial Example Generator JR Asl, MH Rafiei, M Alohaly, D Takabi IEEE Transactions on Dependable and Secure Computing, 2024 | 4 | 2024 |
Exploring Performance Degradation in Virtual Machines Sharing a Cloud Server ME H Ahmed, HJ Syed, A Sadiq, AO Ibrahim, M Alohaly Applied Sciences 13 (16), 9224, 2023 | 4 | 2023 |
A Hybrid Policy Engineering Approach for Attribute-based Access Control (ABAC) M Alohaly, D Takabi 15th International Conference on Information Assurance and Security (IAS), 2020 | 3 | 2020 |
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers SS Alqahtany, AB Alkhodre, A Al Abdulwahid, M Alohaly Applied Sciences 13 (12), 7294, 2023 | 2 | 2023 |
An Advanced Strategy for Addressing Heterogeneity in SDN-IoT Networks for Ensuring QoS ME A Zafar, F Samad, HJ Syed, AO Ibrahim, M Alohaly Applied Sciences 13 (13), 7856, 2023 | 2 | 2023 |
If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies M Alohaly, H Takabi 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 2 | 2016 |
Blind video watermarking scheme for medical video authentication KMH DS Khafaga, M Alohaly, MM Abdel-Aziz Heliyon 9 (9), 2023 | 1 | 2023 |
Detecting Anomalies in IoT Devices: A Machine Learning-Based Solution R Al Attar, M Alohaly Preprints, 2024 | | 2024 |
SSCAE--Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator JR Asl, MH Rafiei, M Alohaly, D Takabi arXiv preprint arXiv:2403.11833, 2024 | | 2024 |