Conference Papers

Wu P; Guo H; Moustafa N, 2020, 'Pelican: A Deep Residual Network for Network Intrusion Detection', in Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, IEEE, pp. 55 - 62, presented at 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 29 June 2020 - 02 July 2020, http://dx.doi.org/10.1109/DSN-W50199.2020.00018

Koroniotis N; Moustafa N, 2020, 'Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework', Sydney, Australia, presented at 7th International Conference on Security and its Applications (CNSA 2020), Sydney, Australia, 28 March 2020 - 29 March 2020

Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019

Moustafa N; Turnbull B; Choo K-KR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', in Proceedings - 2018 IEEE International Conference on Industrial Internet, ICII 2018, 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, pp. 139 - 145, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023

Monks K; Sitnikova E; Moustafa N, 2018, 'Cyber intrusion detection in operations of bulk handling ports', in Josang A (ed.), European Conference on Information Warfare and Security, ECCWS, Academic Conferences and Publishing International Limited, Oslo, Norway, pp. 307 - 316, presented at 17th European Conference on Cyber Warfare and Security ECCWS 2018, Oslo, Norway, 28 June 2018 - 29 June 2018

Wilson SW; Moustafa N; Sitnikova E, 2018, 'A Digital Identity Stack to Improve Privacy in the IoT', in IEEE 4th World Forum on Internet of Things, IEEE, Singapore, pp. 25 - 29, presented at IEEE 4th World Forum on Internet of Things, Singapore, 05 February 2018 - 08 February 2018, http://dx.doi.org/10.1109/WF-IoT.2018.8355199

Moustafa NM; Creech GC; Slay JS, 2017, 'Flow Aggregator Module for Analysing Network Traffic', in Das HD (ed.), International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, pp. 19 - 29, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017, http://dx.doi.org/10.1007/978-981-10-7871-2_3

Moustafa NM; Creech GC; SLAY JS, 2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.), Advances in Intelligent Systems and Computing, School of Computer Engineering, KIIT University, pp. 125 - 135, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017, http://dx.doi.org/10.1007/978-981-10-7871-2_13

Haider WH; Hu JH; Moustafa N, 2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, pp. 137 - 149, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_12

Marsden T; Moustafa N; Sitnikova E; Creech G, 2017, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28

Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2017, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer International Publishing, Melbourne, Australia, pp. 30 - 44, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_3

Hassan MM; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, pp. 1 - 6, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017, http://dx.doi.org/10.1109/MilCIS.2017.8190422

Moustafa N; Creech G; Sitnikova E; Hassan M, 2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, Australia, pp. 1 - 6, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017, http://dx.doi.org/10.1109/MilCIS.2017.8190421

Moustafa N; Slay J, 2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, http://dx.doi.org/10.1109/MilCIS.2015.7348942

Moustafa N; Slay J, 2015, 'A hybrid feature selection for network intrusion detection systems: Central points', in Security Research Institute, Edith Cowan University, the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57a84d4fbefbb

Moustafa N; Slay J, 2015, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, Kyoto, Japan, pp. 25 - 31, presented at 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan, 05 November 2015 - 05 November 2015, http://dx.doi.org/10.1109/BADGERS.2015.14

Moustafa NM; Slay J, 2015, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', in The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems, IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 November 2015 - 05 November 2015, http://dx.doi.org/10.13140/RG.2.1.2264.4883

Moustafa N; Slay J, 2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212

Theses / Dissertations

Moustafa NM, 2017, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, http://handle.unsw.edu.au/1959.4/58748

Showing 51 - 69 of 69 publications
Previous
1
2