Nour Moustafa
Nour Moustafa
Lecturer in Cyber Security- UNSW Canberra, IEEE Senior Member
Verified email at - Homepage
Cited by
Cited by
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)
N Moustafa, J Slay
Military Communications and Information Systems Conference (MilCIS), 2015, 1-6, 2015
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
N Moustafa, J Slay
Information Security Journal: A Global Perspective, 1-14, 2016
Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
N Koroniotis, N Moustafa, E Sitnikova, B Turnbull
Future Generation Computer Systems 100, 779-796, 2019
An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
N Moustafa, B Turnbull, KKR Choo
IEEE Internet of Things Journal, 2018
The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems
N Moustafa, J Slay
2015 4th international workshop on building analysis datasets and gathering …, 2015
Identification of malicious activities in industrial internet of things based on deep learning models
ALH Muna, N Moustafa, E Sitnikova
Journal of information security and applications 41, 1-11, 2018
A holistic review of Network Anomaly Detection Systems: A comprehensive survey
N Moustafa, J Hu, J Slay
Journal of Network and Computer Applications, 2019
Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-scale Networks
N Moustafa, J Slay, G Creech
IEEE Transactions on Big Data, 1-14, 2017
Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models
N Moustafa, G Creech, J Slay
Data Analytics and Decision Support for Cybersecurity 1, 127-156, 2017
A hybrid feature selection for network intrusion detection systems: Central points
N Moustafa, J Slay
the Australian Information Warfare Conference 16, 5-13, 2015
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques
N Koroniotis, N Moustafa, E Sitnikova, J Slay
Mobile Networks and Management: 9th International Conference, MONAMI 2017 …, 2018
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
N Moustafa, E Adi, B Turnbull, J Hu
IEEE Access, 2018
Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog
N Moustafa, KKR Choo, I Radwan, S Camtepe
IEEE Transactions on Information Forensics and Security 14 (8), 1975-1987, 2019
Collaborative anomaly detection framework for handling big data of cloud computing
N Moustafa, G Creech, E Sitnikova, M Keshk
2017 military communications and information systems conference (MilCIS), 1-6, 2017
Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions
N Koroniotis, N Moustafa, E Sitnikova
IEEE Access, 2019
An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems
M Keshk, E Sitnikova, N Moustafa, J Hu, I Khalil
IEEE Transactions on Sustainable Computing, 2019
Anomaly Detection System using Beta Mixture Models and Outlier Detection
N Moustafa, G Creech, J Slay
Progress in Computing, Analytics and Networking. Advances in Intelligent …, 2018
Deep Gaussian mixture-hidden Markov model for classification of EEG signals
M Wang, S Abdelfattah, N Moustafa, J Hu
IEEE Transactions on Emerging Topics in Computational Intelligence 2 (4 …, 2018
Privacy Preservation Intrusion Detection Technique for SCADA Systems
M Keshk, N Moustafa, E Sitnikova, G Creech
Military Communications and Information Systems Conference (MilCIS …, 2017
A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
O Alkadi, N Moustafa, B Turnbull, KKR Choo
IEEE Internet of Things Journal, 2020
The system can't perform the operation now. Try again later.
Articles 1–20