Follow
Marwan Omar
Title
Cited by
Cited by
Year
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
572015
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
462022
Cyber security and mobile threats: The need for antivirus applications for smart phones
J Wright, ME Dawson Jr, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
392012
Security solutions for hyperconnectivity and the Internet of things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
322016
Understanding the methods behind cyber terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology, Third Edition, 1539-1549, 2015
292015
Cloud computing security: abuse and nefarious use of cloud computing
YA Hamza, MD Omar
Int. J. Comput. Eng. Res 3 (6), 22-27, 2013
282013
Insider threats: Detecting and controlling malicious insiders
M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162-172, 2015
222015
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions. Springer Brief
M Omar
https://link.springer.com/book/978303115, 2022
21*2022
Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
D Mohammed, M Omar, V Nguyen
Journal of Research in Business, Economics and Management 10 (2), 1860-1864, 2018
192018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
192013
Net neutrality around the globe: A survey
V Nguyen, D Mohammed, M Omar, P Dean
2020 3rd International Conference on Information and Computer Technologies …, 2020
182020
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
M Omar, D Mohammed, V Nguyen
International Journal of Business Process Integration and Management 8 (2 …, 2017
142017
Mobile devices: The case for cyber security hardened systems
M Dawson, J Wright, M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 8-29, 2015
142015
The future of national and international security on the internet
M Dawson, M Omar, J Abramson, D Bessette
Information security in diverse computing environments, 149-178, 2014
142014
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection
M Omar, D Mohaisen
Companion Proceedings of the Web Conference 2022, 887-893, 2022
132022
Malware anomaly detection using local outlier factor technique
M Omar
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, 37-48, 2022
112022
Technology enhanced learning with open source software for scientists and engineers
M Dawson, I Al Saeed, J Wright, M Omar
INTED2013 Proceedings, 5583-5589, 2013
112013
Security breaches in the healthcare domain: a spatiotemporal analysis
M Al Kinoon, M Omar, M Mohaisen, D Mohaisen
Computational Data and Social Networks: 10th International Conference …, 2021
102021
Android application security
M Omar, D Mohammed, V Nguyen, M Dawson, M Banisakher
Research Anthology on Securing Mobile Technologies and Applications, 610-625, 2021
102021
Text-defend: Detecting adversarial examples using local outlier factor
M Omar, G Sukthankar
2023 IEEE 17th International Conference on Semantic Computing (ICSC), 118-122, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20