Mohammed Hussain
Mohammed Hussain
College of Technological Innovation, Zayed University
Verified email at - Homepage
Cited by
Cited by
A lightweight perceptron-based intrusion detection system for fog computing
B Sudqi Khater, AWB Abdul Wahab, MYIB Idris, M Abdulla Hussain, ...
applied sciences 9 (1), 178, 2019
SECaaS: security as a service for cloud-based applications
M Hussain, H Abdulsalam
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-4, 2011
UMLintr: a UML profile for specifying intrusions
M Hussein, M Zulkernine
13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006
The impact of cloud computing on ITIL service strategy processes
MB Al Mourad, M Hussain
International Journal of Computer and Communication Engineering 3 (5), 367, 2014
Drone Forensics: A Detailed Analysis of Emerging DJI Models
M Yousef, F Iqbal, M Hussain
International conference on information and communication systems, 66-71, 2020
Intrusion detection aware component-based systems: A specification-based framework
M Hussein, M Zulkernine
Journal of Systems and Software 80 (5), 700-710, 2007
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
BS Khater, AWA Wahab, MYI Idris, M Hussain, AA Ibrahim, MA Amin, ...
Electronics 10 (14), 1633, 2021
Digital wellbeing tools through users lens
MB Almourad, A Alrobai, T Skinner, M Hussain, R Ali
Technology in Society 67, 101778, 2021
Mining Educational Data for Academic Accreditation: Aligning Assessment with Outcomes
M Hussain, M Al-Mourad, S Mathew, A Hussein
Global Journal of Flexible Systems Management 18 (1), 51–60, 2017
Software quality in the clouds: a cloud-based solution
M Hussain, HM Abdulsalam
Cluster Computing 17, 389-402, 2014
Effective third party auditing in cloud computing
M Hussain, MB Al-Mourad
2014 28th International Conference on Advanced Information Networking and …, 2014
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
R Ali, A Ali, F Iqbal, M Hussain, F Ullah, A Michienzi
Security and Communication Networks 2022 (2959222), 2022
Trust in Mobile Cloud Computing with LTE-based Deployment
M Hussain, B Almourad
IEEE Conference on Scalable Computing and Communications, 643-648, 2014
Digital forensic acquisition and analysis of discord applications
M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem
2020 international conference on communications, computing, cybersecurity …, 2020
The design and applications of a privacy-preserving identity and trust-management system
M Hussain
Canadian theses, 2010
Analysis of WCAG 2.0 data accessibility success criterion of e-government websites
MB Almourad, M Hussain, F Kamoun, Z Wattar
Periodicals of Engineering and Natural Sciences 7 (1), 496-503, 2019
Using deep learning to detect social media ‘trolls’
Á MacDermott, M Motylinski, F Iqbal, K Stamp, M Hussain, A Marrington
Forensic Science International: Digital Investigation 43, 301446, 2022
Forensic analysis of the Cisco WebEx application
Z Khalid, F Iqbal, F Kamoun, M Hussain, LA Khan
2021 5th Cyber Security in Networking Conference (CSNet), 90-97, 2021
Well-formed semantic model for co-Learning
J Alomari, M Hussain, S Turki, M Masud
Computers in Human Behavior, 2015
Collect, Scope, and Verify Big Data – A Framework for Institution Accreditation
M Hussain, M Al-Mourad, S Mathew
Advanced Information Networking and Applications Workshops (WAINA), 2016 …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20