Evaluation of machine learning algorithms for anomaly detection N Elmrabit, F Zhou, F Li, H Zhou 2020 international conference on cyber security and protection of digital …, 2020 | 130 | 2020 |
Insider threats in information security categories and approaches N Elmrabit, SH Yang, Yang, Lili in Automation and Computing (ICAC), 2015 21st International Conference on, 6, 2015 | 53 | 2015 |
Insider threat risk prediction based on Bayesian network N Elmrabit, SH Yang, L Yang, H Zhou Computers & Security 96, 101908, 2020 | 27 | 2020 |
Privacy-aware secure anonymous communication protocol in CPSS cloud computing F Li, C Cui, D Wang, Z Liu, N Elmrabit, Y Wang, H Zhou IEEE Access 8, 62660-62669, 2020 | 19 | 2020 |
A multiple-perspective approach for insider-threat risk prediction in cyber-security N Elmrabit Loughborough University, 2018 | 4 | 2018 |
Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners K Abdulghaffar, N Elmrabit, Y Mehdi Computers 12 (11), 235, 2023 | 1 | 2023 |
A Review of the Insider Threat, a Practitioner Perspective within the UK Financial Services F Whitelaw, J Riley, N Elrmabit IEEE Access, 2024 | | 2024 |
Privacy-aware secure anonymous communication protocol in CPSS F Li, C Cui, D Wang, Z Liu, N Elmrabit, Y Wang, H Zhou University of Leicester, 2020 | | 2020 |
D4. 1 Overview of the validation framework LUT ISEP | | |