This work is licensed under the Creative Commons Attribution 4.0 International License.
Kinoon M.A., Omar M., Mohaisen M., Mohaisen D., Security breaches in the healthcare domain: a spatiotemporal analysis, Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual, 15–17 November 2021, Proceedings 10, 171–183, Springer, 2021.KinoonM.A.OmarM.MohaisenM.MohaisenD.Security breaches in the healthcare domain: a spatiotemporal analysisComputational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual15–17 November 2021Proceedings 10,171183Springer2021Search in Google Scholar
Omar M., New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders), 162–172, 2015.OmarM.New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders)1621722015Search in Google Scholar
Omar M., Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (1st Ed.), Springer, 2022.OmarM.Machine Learning for Cybersecurity: Innovative Deep Learning Solutions1st Ed.Springer2022Search in Google Scholar
Omar M., VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models, 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, 22–24 May 2023, Amman, Jordan.OmarM.VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology22–24 May 2023Amman, JordanSearch in Google Scholar
Omar M., Jones R., Burrell D.N., Dawson M., Nobles C., Mohammed D., Bashir A.K., Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware), 215–229, IGI Global, 2023.OmarM.JonesR.BurrellD.N.DawsonM.NoblesC.MohammedD.BashirA.K.Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware)215229IGI Global2023Search in Google Scholar
Statista. (n.d.), Global smartphone OS market share of Android, https://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/, Accessed: December 15, 2023.Statista(n.d.),Global smartphone OS market share of Androidhttps://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/Accessed: December 15, 2023.Search in Google Scholar
Zhou Y., Jiang X., Dissecting android malware: Characterization and evolution, 2012 IEEE Symposium on Security and Privacy, 20–23 May 2012, San Francisco, California, USA.ZhouY.JiangX.Dissecting android malware: Characterization and evolution2012 IEEE Symposium on Security and Privacy20–23 May 2012San Francisco, California, USASearch in Google Scholar
Felt A.P., Chin E., Hanna S., Song D., Wagner D., Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 17–21 October 2011, Chicago, Illinois, USA.FeltA.P.ChinE.HannaS.SongD.WagnerD.Android permissions demystifiedProceedings of the 18th ACM Conference on Computer and Communications Security17–21 October 2011Chicago, Illinois, USASearch in Google Scholar
Omar M., Smartphone security: Defending Android-based smartphone against emerging malware attacks, (PhD Thesis), Colorado Technical University, USA, 2012.OmarM.Smartphone security: Defending Android-based smartphone against emerging malware attacks, (PhD Thesis)Colorado Technical UniversityUSA2012Search in Google Scholar
Omar M., Dawson M., Research in progress-defending android smartphones from malware attacks, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 288–292, IEEE, 2013.OmarM.DawsonM.Research in progress-defending android smartphones from malware attacks2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT)288292IEEE,2013Search in Google Scholar
Banisakher M., Omar M., A world of cyber attacks (a survey), KSU Proceedings on Cybersecurity Education, Research and Practice, 7, 1–6, 2019.BanisakherM.OmarM.A world of cyber attacks (a survey), KSU Proceedings on Cybersecurity EducationResearch and Practice7162019Search in Google Scholar
Omar M., Mohammed D., Nguyen V., Dawson M., Banisakher M., Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security), 610–625, IGI Global, 2021.OmarM.MohammedD.NguyenV.DawsonM.BanisakherM.Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security)610625IGI Global2021Search in Google Scholar
Faruki P., Bharmal A., Laxmi V., Ganmoor V., Gaur M.S., Conti M., Rajarajan M., Android security: a survey of issues malware penetration and defenses, IEEE Communications Surveys and Tutorials, 17(2), 998–1022, 2015.FarukiP.BharmalA.LaxmiV.GanmoorV.GaurM.S.ContiM.RajarajanM.Android security: a survey of issues malware penetration and defensesIEEE Communications Surveys and Tutorials17299810222015Search in Google Scholar
Mohammed D., Omar M., Nguyen V., Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards), 17, 113–129, 2017.MohammedD.OmarM.NguyenV.Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards)171131292017Search in Google Scholar
Mohammed D., Omar M., Nguyen V., Wireless sensor network security: approaches to detecting and avoiding wormhole attacks, Journal of Research in Business Economics and Management, 10(2), 1860–1864, 2018.MohammedD.OmarM.NguyenV.Wireless sensor network security: approaches to detecting and avoiding wormhole attacksJournal of Research in Business Economics and Management102186018642018Search in Google Scholar
Ayub M.F., Li X., Mahmood K., Shamshad S., Saleem M.A., Omar M., Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication, IEEE Transactions on Consumer Electronics, 1–10, 2023.AyubM.F.LiX.MahmoodK.ShamshadS.SaleemM.A.OmarM.Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authenticationIEEE Transactions on Consumer Electronics1102023Search in Google Scholar
Dawson M., Omar M., Eltayeb M., Security Solutions for Hyperconnectivity and the Internet of Things, IGI Global, 2016.DawsonM.OmarM.EltayebM.Security Solutions for Hyperconnectivity and the Internet of ThingsIGI Global2016Search in Google Scholar
Dawson M., Omar M., Abramson J., Leonard B., Bessette D., Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things), 204–235, 2017.DawsonM.OmarM.AbramsonJ.LeonardB.BessetteD.Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things)2042352017Search in Google Scholar
Gholami S., Omar M., Can a student large language model perform as well as it's teacher?, arXiv:2310.02421, 2023.GholamiS.OmarM.Can a student large language model perform as well as it's teacher?arXiv:2310.02421,2023Search in Google Scholar
Omar M., Developing cybersecurity education capabilities at Iraqi universities, 16th Annual Conference of the Midwest Association for Information Systems, 10, 2021.OmarM.Developing cybersecurity education capabilities at Iraqi universities16th Annual Conference of the Midwest Association for Information Systems102021Search in Google Scholar
Omar M., Choi S., Nyang D., Mohaisen D., Quantifying the performance of adversarial training on language models with distribution shifts, 1st Workshop on Cybersecurity and Social Sciences, 30 May 2022, Nagasaki, Japan.OmarM.ChoiS.NyangD.MohaisenD.Quantifying the performance of adversarial training on language models with distribution shifts1st Workshop on Cybersecurity and Social Sciences30 May 2022Nagasaki, JapanSearch in Google Scholar
Omar M., Choi S., Nyang D., Mohaisen D., Robust natural language processing: Recent advances challenges and future directions, IEEE Access, 10, 86038–86056, 2022.OmarM.ChoiS.NyangD.MohaisenD.Robust natural language processing: Recent advances challenges and future directionsIEEE Access1086038860562022Search in Google Scholar
Omar M., Sukthankar G., Text-defend: Detecting adversarial examples using local outlier factor, 2023 IEEE 17th International Conference on Semantic Computing, 01–03 February 2023, California, USA.OmarM.SukthankarG.Text-defend: Detecting adversarial examples using local outlier factor2023 IEEE 17th International Conference on Semantic Computing01–03 February 2023California, USASearch in Google Scholar
Saleem M.A., Li X., Mahmood K., Shamshad S., Ayub M.F., Bashir A.K., Omar M., Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3324273, 2023.SaleemM.A.LiX.MahmoodK.ShamshadS.AyubM.F.BashirA.K.OmarM.Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANETIEEE Transactions on Consumer Electronics10.1109/TCE.2023.33242732023Open DOISearch in Google Scholar
Zhou S., Ali A., Al-Fuqaha A., Omar M., Feng L., Robust risk-sensitive task offloading for edge-enabled industrial internet of things, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3323146, 2023.ZhouS.AliA.Al-FuqahaA.OmarM.FengL.Robust risk-sensitive task offloading for edge-enabled industrial internet of thingsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.33231462023Open DOISearch in Google Scholar
Breunig M.M., Kriegel H.P., Raymond T.N., Sander J., LOF: identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 15–18 May 2000, Texas, USA.BreunigM.M.KriegelH.P.RaymondT.N.SanderJ.LOF: identifying density-based local outliersProceedings of the 2000 ACM SIGMOD International Conference on Management of Data15–18 May 2000Texas, USASearch in Google Scholar
Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Drebin: Effective and explainable detection of android malware in your pocket, Proceedings of the Network and Distributed System Security Symposium, Internet Society, 23–26 February 2014, San Diego, California, USA.ArpD.SpreitzenbarthM.HubnerM.GasconH.RieckK.Drebin: Effective and explainable detection of android malware in your pocketProceedings of the Network and Distributed System Security Symposium, Internet Society23–26 February 2014San Diego, California, USASearch in Google Scholar