• BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem 

      Awuson-David, Kenny; Al-Hadhrami, Tawfik; Alazab, Mamoun; Shah, Nazaraf; Shalaginov, Andrii (Journal article; Peer reviewed, 2021)
      Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when, why and how a cyber adversary or an ...
    • Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace 

      Guo, Zhiwei; Tang, Lianggui; Guo, Tan; Yu, Keping; Alazab, Mamoun; Shalaginov, Andrii (Peer reviewed; Journal article, 2021)
      Due to the severe threat to cyberspace security, detection of online spammers has been a universal concern of academia. Nowadays, prevailing literature of this field almost leveraged various relations to enhance feature ...
    • Intelligent mobile malware detection using permission requests and API calls 

      Alazab, Moutaz; Alazab, Mamoun; Shalaginov, Andrii; Mesleh, Abdelwadood; Awajan, Albara (Peer reviewed; Journal article, 2020)
      Malware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against the ...
    • Predicting likelihood of legitimate data loss in email DLP 

      Faiz, Mohamed Falah; Junaid, Arshad; Alazab, Mamoun; Shalaginov, Andrii (Journal article; Peer reviewed, 2019)
      The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ...