Follow
Marwan Omar
Title
Cited by
Cited by
Year
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
672015
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
632022
Cyber security and mobile threats: The need for antivirus applications for smart phones
J Wright, ME Dawson Jr, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
412012
Security solutions for hyperconnectivity and the Internet of things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
342016
Cloud computing security: abuse and nefarious use of cloud computing
YA Hamza, MD Omar
Int. J. Comput. Eng. Res 3 (6), 22-27, 2013
332013
Understanding the methods behind cyber terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology, Third Edition, 1539-1549, 2015
322015
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions. Springer Brief
M Omar
https://link.springer.com/book/978303115, 2022
27*2022
Insider threats: Detecting and controlling malicious insiders
M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162-172, 2015
262015
Net neutrality around the globe: A survey
V Nguyen, D Mohammed, M Omar, P Dean
2020 3rd International Conference on Information and Computer Technologies …, 2020
232020
Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
D Mohammed, M Omar, V Nguyen
Journal of Research in Business, Economics and Management 10 (2), 1860-1864, 2018
232018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
202013
Heart failure patients monitoring using IoT-based remote monitoring system
M Umer, T Aljrees, H Karamti, A Ishaq, S Alsubai, M Omar, AK Bashir, ...
Scientific Reports 13 (1), 19213, 2023
182023
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
M Omar, D Mohammed, V Nguyen
International Journal of Business Process Integration and Management 8 (2 …, 2017
182017
Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in vanet
MA Saleem, X Li, K Mahmood, S Shamshad, MF Ayub, AK Bashir, ...
IEEE Transactions on Consumer Electronics, 2023
172023
Backdoor learning for nlp: Recent advances, challenges, and future research directions
M Omar
arXiv preprint arXiv:2302.06801, 2023
172023
Security breaches in the healthcare domain: a spatiotemporal analysis
M Al Kinoon, M Omar, M Mohaisen, D Mohaisen
Computational Data and Social Networks: 10th International Conference …, 2021
172021
Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
MF Ayub, X Li, K Mahmood, S Shamshad, MA Saleem, M Omar
IEEE Transactions on Consumer Electronics, 2023
162023
Developing learning objects for engineering and science fields: using technology to test system usability and interface design
M Dawson, L Davis, M Omar
International Journal of Smart Technology and Learning 1 (2), 140-161, 2019
162019
Mobile devices: The case for cyber security hardened systems
M Dawson, J Wright, M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 8-29, 2015
162015
Text-defend: detecting adversarial examples using local outlier factor
M Omar, G Sukthankar
2023 IEEE 17th international conference on semantic computing (ICSC), 118-122, 2023
152023
The system can't perform the operation now. Try again later.
Articles 1–20