Beyond Data: Contextual Information Fusion for Cyber Security Analytics | Ahmed Aleroud and George Karabatis | | | |
Identifying DoS Attacks on Software Defined Networks | Ahmed Aleroud and Izzat Alsmadi | | | |
Towards Adaptive Big Data Cyber-attack Detection via Semantic Link Networks | Georgr Karabatis, Jianwu Wang and Ahmed Aleroud | | | |
Multi-granular aggregation of network flows for security analysis | T. Ding, A. AlEroud, and G. Karabatis | | | |
Context Infusion in Semantic Link Networks to Detect Cyber-attacks | Ahmed Aleroud and George Karabatis | | | |
A Contextual Anomaly Detection Approach to Discover Zero-day Attacks, | Ahmed Aleroud and George Karabatis | | | |
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques | Ahmed Aleroud and George Karabatis | | | |
Phish-GAN: Generating Phishing Attacks Using Feature-Oriented Adversarial Deep Neural Networks | Ahmed Aleroud and George Karabatis | | | ---- |
Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique | Aleroud, Ahmed, Zhiyuan Chen, and George Karabatis | | | ---- |
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques | A. AlEroud and G. Karabatis | | | ---- |
SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks | AlEroud A, and G. Karabatis | | | ---- |
Generating Optimal Attack Paths in Generative Adversarial Phishing | Al-Qurashi, Rayah, et al | | | ---- |