Marwan Omar
Cited by
Cited by
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
Cyber security and mobile threats: The need for antivirus applications for smart phones
J Wright, ME Dawson Jr, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
Security solutions for hyperconnectivity and the Internet of things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
Understanding the methods behind cyber terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology, Third Edition, 1539-1549, 2015
Cloud computing security: abuse and nefarious use of cloud computing
YA Hamza, MD Omar
Int. J. Comput. Eng. Res 3 (6), 22-27, 2013
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions. Springer Brief
M Omar, 2022
Insider threats: Detecting and controlling malicious insiders
M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162-172, 2015
Net neutrality around the globe: A survey
V Nguyen, D Mohammed, M Omar, P Dean
2020 3rd International Conference on Information and Computer Technologies …, 2020
Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
D Mohammed, M Omar, V Nguyen
Journal of Research in Business, Economics and Management 10 (2), 1860-1864, 2018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection
M Omar, D Mohaisen
Companion Proceedings of the Web Conference 2022, 887-893, 2022
Security breaches in the healthcare domain: a spatiotemporal analysis
M Al Kinoon, M Omar, M Mohaisen, D Mohaisen
Computational Data and Social Networks: 10th International Conference …, 2021
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
M Omar, D Mohammed, V Nguyen
International Journal of Business Process Integration and Management 8 (2 …, 2017
Mobile devices: The case for cyber security hardened systems
M Dawson, J Wright, M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 8-29, 2015
The future of national and international security on the internet
M Dawson, M Omar, J Abramson, D Bessette
Information security in diverse computing environments, 149-178, 2014
Developing learning objects for engineering and science fields: using technology to test system usability and interface design
M Dawson, L Davis, M Omar
International Journal of Smart Technology and Learning 1 (2), 140-161, 2019
Do Generative Large Language Models need billions of parameters?
S Gholami, M Omar
arXiv preprint arXiv:2309.06589, 2023
Text-defend: detecting adversarial examples using local outlier factor
M Omar, G Sukthankar
2023 IEEE 17th international conference on semantic computing (ICSC), 118-122, 2023
Malware anomaly detection using local outlier factor technique
M Omar
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, 37-48, 2022
The system can't perform the operation now. Try again later.
Articles 1–20