[
Al Kinoon, M., Omar, M., Mohaisen, M., & Mohaisen, D. (2021). Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis. Proceedings of the 10th International Conference Computational Data and Social Networks – CSoNet, 171–183. Available at: https://doi.org/10.1007/978-3-030-91434-9_16.
]Search in Google Scholar
[
Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., & Roli, F. (2013). Evasion Attacks against Machine Learning at Test Time. Machine Learning and Knowledge Discovery in Databases, European Conference, ECML PKDD, Part III, Vol. 8190, LNCS, 387–402, Springer. Available at: https://doi.org/10.1007/978-3-642-40994-3_25.
]Search in Google Scholar
[
Gandotra, E., Bansal, D., & Sofat, S. (2014). Malware Analysis and Classification: A Survey. Journal of Information Security, Vol. 5, Issue 2, 56–64. DOI:10.4236/jis.2014.52006.
]Search in Google Scholar
[
Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2018). Deep Learning for Classification of Malware System Call Sequences. 29th Australasian Joint Conference on Artificial Intelligence, 137–153. DOI:10.1007/978-3-319-50127-7_11.
]Search in Google Scholar
[
Mohammed, D., Omar, M., & Nguyen, V. (2018). Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks. Journal of Research in Business, Economics and Management, Vol. 10, Issue 2, 1860–1864. Available at: http://www.scitecresearch.com/journals/index.php/jrbem/article/view/1413.
]Search in Google Scholar
[
Banisakher, M., Omar, M., Hong, S., & Adams, J. (2020). A Human Centric Approach to Data Fusion in Post-Disaster Management. Journal of Business and Management Sciencies, Vol. 8, Issue 1, 12–20. DOI: 10.12691/jbms-8-1-3.
]Search in Google Scholar
[
Nguyen, V., Mohammed, D., Omar, M., & Dean, P. (2020). Net Neutrality Around the Globe: A Survey. 3rd International Conference on Information and Computer technologies – ICICT. DOI:10.1109/ICICT50521.2020.00083.
]Search in Google Scholar
[
Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). Information Security in Diverse Computing Environments, Chapter 9: The Future of National and International Security on the Internet, 149–178. DOI: 10.4018/978-1-4666-6158-5.
]Search in Google Scholar
[
Zangana, H.M., & Omar, M. (2020). Threats, Attacks, and Mitigations of Smartphone Security. Academic Journal of Nawroz University, Vol. 9, Issue 4, 324–332. DOI: https://doi.org/10.25007/ajnu.v9n4a989.
]Search in Google Scholar
[
Omar, M. (2021a). New insights into database security: An effective and integrated approach for applying access control mechanisms and cryptographic concepts in Microsoft Access environments. MWAIS 2021 Proceedings, 20. Available at: https://aisel.aisnet.org/mwais2021/20.
]Search in Google Scholar
[
Omar, M. (2021b). Developing Cybersecurity Education Capabilities at Iraqi Universities. MWAIS 2021 Proceedings, 10. Available at: https://aisel.aisnet.org/mwais2021/10.
]Search in Google Scholar
[
Omar, M. (2022). Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, Chapter 1: Application of Machine Learning (ML) to Address Cybersecurity Threats. New York: Springer International Publishing.
]Search in Google Scholar
[
Omar, M., Choi, S., Nyang, D., & Mohaisen, D. (2022). Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. IEEE Access, Computer Science, Linguistics, Vol. 10. DOI: 10.1109/ACCESS.2022.3197769.
]Search in Google Scholar
[
Omar, M., Gouveia, L.B., Al-Karaki, J., & Mohammed, D. (2022). Reverse-Engineering Malware. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security, 194–217. DOI:10.4018/978-1-7998-8693-8.ch010.
]Search in Google Scholar