Follow
Marwan Omar
Title
Cited by
Cited by
Year
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
662015
Robust natural language processing: Recent advances, challenges, and future directions
M Omar, S Choi, DH Nyang, D Mohaisen
IEEE Access 10, 86038-86056, 2022
632022
Cyber security and mobile threats: The need for antivirus applications for smart phones
J Wright, ME Dawson Jr, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
442012
Security solutions for hyperconnectivity and the Internet of things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
362016
Understanding the methods behind cyber terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology, Third Edition, 1539-1549, 2015
352015
Cloud computing security: abuse and nefarious use of cloud computing
YA Hamza, MD Omar
Int. J. Comput. Eng. Res 3 (6), 22-27, 2013
352013
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions. Springer Brief
M Omar
https://link.springer.com/book/978303115, 2022
29*2022
Insider threats: Detecting and controlling malicious insiders
M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162-172, 2015
282015
Net neutrality around the globe: A survey
V Nguyen, D Mohammed, M Omar, P Dean
2020 3rd International Conference on Information and Computer Technologies …, 2020
262020
Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
D Mohammed, M Omar, V Nguyen
Journal of Research in Business, Economics and Management 10 (2), 1860-1864, 2018
242018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
222013
Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders
M Omar, D Mohammed, V Nguyen
International Journal of Business Process Integration and Management 8 (2 …, 2017
212017
Heart failure patients monitoring using IoT-based remote monitoring system
M Umer, T Aljrees, H Karamti, A Ishaq, S Alsubai, M Omar, AK Bashir, ...
Scientific Reports 13 (1), 19213, 2023
192023
Security breaches in the healthcare domain: a spatiotemporal analysis
M Al Kinoon, M Omar, M Mohaisen, D Mohaisen
Computational Data and Social Networks: 10th International Conference …, 2021
192021
Mobile devices: The case for cyber security hardened systems
M Dawson, J Wright, M Omar
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 8-29, 2015
192015
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection
M Omar, D Mohaisen
Companion Proceedings of the Web Conference 2022, 887-893, 2022
182022
Developing learning objects for engineering and science fields: using technology to test system usability and interface design
M Dawson, L Davis, M Omar
International Journal of Smart Technology and Learning 1 (2), 140-161, 2019
182019
The future of national and international security on the internet
M Dawson, M Omar, J Abramson, D Bessette
Information security in diverse computing environments, 149-178, 2014
182014
Do Generative large language models need billions of parameters?
S Gholami
Redefining Security With Cyber AI, 37-55, 2024
172024
Backdoor learning for nlp: Recent advances, challenges, and future research directions
M Omar
arXiv preprint arXiv:2302.06801, 2023
172023
The system can't perform the operation now. Try again later.
Articles 1–20