Smartphone malware detection: From a survey towards taxonomy A Amamra, C Talhi, JM Robert 2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012 | 63 | 2012 |
A compute and wait in pow (cw-pow) consensus algorithm for preserving energy consumption M Kara, A Laouid, M AlShaikh, M Hammoudeh, A Bounceur, R Euler, ... Applied Sciences 11 (15), 6750, 2021 | 30 | 2021 |
Generative versus discriminative classifiers for android anomaly‐based detection system using system calls filtering and abstraction process A Amamra, JM Robert, A Abraham, C Talhi Security and Communication Networks 9 (16), 3483-3495, 2016 | 20 | 2016 |
Enhancing malware detection for Android systems using a system call filtering and abstraction process A Amamra, JM Robert, C Talhi Security and Communication networks 8 (7), 1179-1192, 2015 | 19 | 2015 |
Using a distributed deep learning algorithm for analyzing big data in smart cities MA Naoui, B Lejdel, M Ayad, A Amamra, O kazar Smart and Sustainable Built Environment 10 (1), 90-105, 2021 | 18 | 2021 |
Reconfigurable underwater embedded systems architectures H Albarakati, A Amamra, R Elfouly, R Ammar 2017 IEEE Symposium on Computers and Communications (ISCC), 1372-1379, 2017 | 13 | 2017 |
Enhancing smartphone malware detection performance by applying machine learning hybrid classifiers A Amamra, C Talhi, JM Robert, M Hamiche Computer Applications for Software Engineering, Disaster Recovery, and …, 2012 | 12 | 2012 |
Performance evaluation of multi-pattern matching algorithms on smartphone A Amamra, C Talhi, JM Robert 2012 Seventh International Conference on Broadband, Wireless Computing …, 2012 | 7 | 2012 |
Impact of dataset representation on smartphone malware detection performance A Amamra, C Talhi, JM Robert Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM …, 2013 | 5 | 2013 |
Development of undergraduate interdisciplinary cybersecurity program: A literature survey T Omar, S Venkatesan, A Amamra 2018 ASEE Annual Conference & Exposition, 2018 | 4 | 2018 |
Anomaly detection system using system calls for android smartphone system A Amamra École de technologie supérieure, 2015 | 3 | 2015 |
Using machine learning for raspberry pi network intrusion detection A Jimenez Diss. California State Polytechnic University, Pomona, 2021 | 1 | 2021 |
Integrating Non-encrypted and Encrypted Features for Enhanced Detection of Encrypted Network Attacks A Amamra, R Khettab, R Mezine International Conference on Computer and Communication Engineering, 51-62, 2024 | | 2024 |
Performance Evaluation of Machine-Learning Models for Self-Healing in 5G Networks T Omar, A Amamra, T Ketseoglou, C Mejia, C Soto, Q Stankus, G Zelinka International Journal of Interdisciplinary Telecommunications and Networking …, 2022 | | 2022 |
Interdisciplinary Cybersecurity Projects Experience: Developing a Market-ready Workforce T Omar, A Amamra, K Rigden, T Ketseoglou 2020 ASEE Virtual Annual Conference Content Access, 2020 | | 2020 |
Security and Usability Testing of Smartphone Security (S2) Lab H Gaukel | | 2020 |
MACHINE LEARNING METHOD FOR CYBER SECURITY INTRUSION DETECTION FOR INDUSTRIAL CONTROL SYSTEMS (ICSS) R Halftermeyer California State Polytechnic University, Pomona, 2020 | | 2020 |
Integrating Non-encrypted and Encrypted Features for Enhanced A Amamra, R Khettab, R Mezine Computer and Communication Engineering: 4th International Conference, CCCE …, 0 | | |