Malware classification with deep convolutional neural networks M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal 2018 9th IFIP international conference on new technologies, mobility and …, 2018 | 431 | 2018 |
Security and privacy challenges in smart cities T Braun, BCM Fung, F Iqbal, B Shah Sustainable cities and society 39, 499-507, 2018 | 390 | 2018 |
Mining writeprints from anonymous e-mails for forensic investigation F Iqbal, H Binsalleeh, BCM Fung, M Debbabi digital investigation 7 (1-2), 56-64, 2010 | 213 | 2010 |
A novel approach of mining write-prints for authorship attribution in e-mail forensics F Iqbal, R Hadjidj, BCM Fung, M Debbabi digital investigation 5, S42-S51, 2008 | 157 | 2008 |
A hybrid framework for sentiment analysis using genetic algorithm based feature reduction F Iqbal, JM Hashmi, BCM Fung, R Batool, AM Khattak, S Aleem, ... IEEE Access 7, 14637-14652, 2019 | 153 | 2019 |
Towards an integrated e-mail forensic analysis framework R Hadjidj, M Debbabi, H Lounis, F Iqbal, A Szporer, D Benredjem digital investigation 5 (3-4), 124-137, 2009 | 146 | 2009 |
A unified data mining solution for authorship analysis in anonymous textual communications F Iqbal, H Binsalleeh, BCM Fung, M Debbabi Information Sciences 231, 98-112, 2013 | 144 | 2013 |
Learning stylometric representations for authorship analysis SHH Ding, BCM Fung, F Iqbal, WK Cheung IEEE transactions on cybernetics 49 (1), 107-121, 2017 | 129 | 2017 |
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ... Computers & Security 91, 101707, 2020 | 86 | 2020 |
Sonar: Automatic detection of cyber security events over the twitter stream Q Le Sceller, EMB Karbab, M Debbabi, F Iqbal Proceedings of the 12th International Conference on Availability …, 2017 | 85 | 2017 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, A MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 84 | 2020 |
E-mail authorship verification for forensic investigation F Iqbal, LA Khan, BCM Fung, M Debbabi Proceedings of the 2010 ACM Symposium on Applied computing, 1591-1598, 2010 | 81 | 2010 |
Unmanned aerial vehicles enabled IoT platform for disaster management W Ejaz, MA Azam, S Saadat, F Iqbal, A Hanan Energies 12 (14), 2706, 2019 | 80 | 2019 |
ZigBee security vulnerabilities: Exploration and evaluating S Khanji, F Iqbal, P Hung 2019 10th international conference on information and communication systems …, 2019 | 75 | 2019 |
Deepfake audio detection via MFCC features using machine learning A Hamza, ARR Javed, F Iqbal, N Kryvinska, AS Almadhor, Z Jalil, ... IEEE Access 10, 134018-134028, 2022 | 66 | 2022 |
Drone forensics: challenges and new insights H Bouafif, F Kamoun, F Iqbal, A Marrington 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 66 | 2018 |
Authorship identification using ensemble learning A Abbasi, AR Javed, F Iqbal, Z Jalil, TR Gadekallu, N Kryvinska Scientific reports 12 (1), 9537, 2022 | 52 | 2022 |
SafePath: Differentially-private publishing of passenger trajectories in transportation systems K Al-Hussaeni, BCM Fung, F Iqbal, GG Dagher, EG Park Computer Networks 143, 126-139, 2018 | 51 | 2018 |
E-mail authorship attribution using customized associative classification RS Michael, I Farkhund, F Benjamin C.M. Digital Investigation 14 (1), 116-126, 2015 | 51 | 2015 |
Blockchain-based chain of custody: towards real-time tamper-proof evidence management L Ahmad, S Khanji, F Iqbal, F Kamoun Proceedings of the 15th international conference on availability …, 2020 | 49 | 2020 |