• Publications
  • Influence
Fraud detection system: A survey
tl;dr
The increment of computer technology use and the continued growth of companies have enabled most financial transactions to be performed through the electronic commerce systems, such as using the credit card system, telecommunication system, healthcare insurance system, automobile insurance system and online auction system. Expand
  • 162
  • 14
  • Open Access
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
tl;dr
The paper surveys state-of-the-art studies on ransomware analysis, detection, and prediction. Expand
  • 74
  • 7
Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph
tl;dr
In this study, a malware detection system based on Application Programming Interface (API) call graph is proposed. Expand
  • 46
  • 4
  • Open Access
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
tl;dr
A new adaptive and efficient dimension reduction model (APCADR) is proposed for hierarchical sensor networks based on the candid covariance-free incremental PCA (CCIPCA). Expand
  • 33
  • 3
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection
tl;dr
We use wrapper approach where we integrate Rough Set and Particle Swarm to form a 2-tier structure of feature selection process. Expand
  • 52
  • 3
  • Open Access
A Survey of Intrusion Detection Schemes in Wireless Sensor Networks
tl;dr
We present a survey of intrusion detection schemes in WSNs and show their advantages and drawbacks. Expand
  • 59
  • 3
In memory detection of Windows API call hooking technique
tl;dr
An analysis of current Windows API call hooking techniques is presented where surprisingly, it was found that detection of each technique can be done trivially in memory. Expand
  • 14
  • 3
A Hybrid Color Space for Skin Detection Using Genetic Algorithm Heuristic Search and Principal Component Analysis Technique
tl;dr
We propose a new three-dimensional hybrid color space termed SKN by employing Genetic Algorithm heuristic and Principal Component Analysis to find the optimal representation of human skin color in over seventeen existing color spaces. Expand
  • 18
  • 3
Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment
tl;dr
In order to deal with security of Mobile Cloud Computing (MCC) authentication plays an important role. Expand
  • 13
  • 3
  • Open Access
Malware detection based on hybrid signature behavior application programming interface call graph
tl;dr
A new malware detection framework combines Signature-Based and Behaviour-Based techniques to improve accuracy and scan process time for malware detection. Expand
  • 79
  • 2