Nour Moustafa
Nour Moustafa
Senior Lecturer in Cyber Security - UNSW Canberra, IEEE Senior Member
Verified email at - Homepage
Cited by
Cited by
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)
N Moustafa, J Slay
Military Communications and Information Systems Conference (MilCIS), 2015
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
N Moustafa, J Slay
Information Security Journal A Global Perspective, 2016
Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
N Koroniotis, N Moustafa, E Sitnikova, B Turnbull
Future Generation Computer Systems, 2019
An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
N Moustafa, B Turnbull, KKR Choo
IEEE Internet of Things Journal, 2018
Identification of malicious activities in industrial internet of things based on deep learning models
ALH Muna, N Moustafa, E Sitnikova
Journal of Information security and applications 41, 1-11, 2018
The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems
N Moustafa, J Slay
2015 4th international workshop on building analysis datasets and gathering …, 2015
A holistic review of Network Anomaly Detection Systems: A comprehensive survey
N Moustafa, J Hu, J Slay
Journal of Network and Computer Applications, 2019
Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-scale Networks
N Moustafa, J Slay, G Creech
IEEE Transactions on Big Data, 1-14, 2017
Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models
N Moustafa, G Creech, J Slay
Data Analytics and Decision Support for Cybersecurity 1, 127-156, 2017
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access, 2018
A hybrid feature selection for network intrusion detection systems: Central points
N Moustafa, J Slay
the Australian Information Warfare Conference 16, 5-13, 2015
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques
N Koroniotis, N Moustafa, E Sitnikova, J Slay
Mobile Networks and Management: 9th International Conference, MONAMI 2017 …, 2018
Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog
N Moustafa, KKR Choo, I Radwan, S Camtepe
IEEE Transactions on Information Forensics and Security 14 (8), 1975-1987, 2019
Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions
N Koroniotis, N Moustafa, E Sitnikova
IEEE Access, 2019
An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems
M Keshk, E Sitnikova, N Moustafa, J Hu, I Khalil
IEEE Transactions on Sustainable Computing 6 (1), 66-79, 2019
Collaborative anomaly detection framework for handling big data of cloud computing
N Moustafa, G Creech, E Sitnikova, M Keshk
2017 military communications and information systems conference (MilCIS), 1-6, 2017
A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
O Alkadi, N Moustafa, B Turnbull, KKR Choo
IEEE Internet of Things Journal, 2020
A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework
N Koroniotis, N Moustafa, E Sitnikova
Future Generation Computer Systems, 2020
A Privacy-Preserving Framework based Blockchain and Deep Learning for Protecting Smart Power Networks
M Keshk, B Turnbull, N Moustafa, D Vatsalan, KKR Choo
IEEE Transactions on Industrial Informatics, 2020
Privacy Preservation Intrusion Detection Technique for SCADA Systems
M Keshk, N Moustafa, E Sitnikova, G Creech
Military Communications and Information Systems Conference (MilCIS …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20