Follow
Hisham Alasmary
Hisham Alasmary
Associate Professor, King Khalid University
Verified email at kku.edu.sa
Title
Cited by
Cited by
Year
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1662019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th international conference on distributed computing systems …, 2019
1082019
RouteChain: Towards blockchain-based secure and efficient BGP routing
M Saad, A Anwar, A Ahmad, H Alasmary, M Yuksel, D Mohaisen
Computer Networks 217, 109362, 2022
682022
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 185, 107699, 2021
632021
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
562020
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, D Nyang, A Mohaisen
Computational Data and Social Networks: 7th International Conference, CSoNet …, 2018
552018
Intrusion detection based on bidirectional long short-term memory with attention mechanism
Y Yang, S Tu, RH Ali, H Alasmary, M Waqas, MN Amjad
Tech Science Press 74 (1), 801, 2023
502023
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
492021
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
M Tanveer, A Badshah, H Alasmary, SA Chaudhry
Internet of Things 23, 100902, 2023
332023
Feddp: A privacy-protecting theft detection scheme in smart grids using federated learning
MM Ashraf, M Waqas, G Abbas, T Baker, ZH Abbas, H Alasmary
Energies 15 (17), 6241, 2022
302022
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
272019
Analysis of enrollment criteria in secondary schools using machine learning and data mining approach
Z Abideen, T Mazhar, A Razzaq, I Haq, I Ullah, H Alasmary, HG Mohamed
Electronics 12 (3), 694, 2023
252023
Cyberattacks and security of cloud computing: a complete guideline
M Dawood, S Tu, C Xiao, H Alasmary, M Waqas, SU Rehman
Symmetry 15 (11), 1981, 2023
242023
Subgraph-based adversarial examples against graph-based IoT malware detection systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ...
Computational Data and Social Networks: 8th International Conference, CSoNet …, 2019
232019
Enhancing localization efficiency and accuracy in wireless sensor networks
M Fawad, MZ Khan, K Ullah, H Alasmary, D Shehzad, B Khan
Sensors 23 (5), 2796, 2023
222023
Statically dissecting internet of things malware: Analysis, characterization, and detection
A Anwar, H Alasmary, J Park, A Wang, S Chen, D Mohaisen
Information and Communications Security: 22nd International Conference …, 2020
212020
ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework
H Alasmary, M Tanveer
Mathematics 11 (16), 3450, 2023
182023
Deep reinforcement learning based intrusion detection system with feature selections method and optimal hyper-parameter in IoT environment
S Bakhshad, V Ponnusamy, R Annur, M Waqasyz, H Alasmary, S Tux
2022 International Conference on Computer, Information and Telecommunication …, 2022
172022
SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones
M Tanveer, H Alasmary, N Kumar, A Nayak
IEEE Transactions on Vehicular Technology, 2023
162023
EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing
S Tu, A Badshah, H Alasmary, M Waqas
IEEE Transactions on Mobile Computing, 2023
152023
The system can't perform the operation now. Try again later.
Articles 1–20