![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Muna Al-Hawawreh
Person information
- affiliation: Deakin University, Victoria, Australia
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Muna Al-Hawawreh, Zubair A. Baig, Sherali Zeadally:
Resilient Intrusion Detection Models for Closed Control-Loop in Cyber-Physical Systems: Combating Adversarial Examples. IEEE Internet Things Mag. 8(1): 73-80 (2025) - 2024
- [j20]Muna Al-Hawawreh
, Nour Moustafa
:
Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Networks 153: 103329 (2024) - [j19]Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh:
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts. Clust. Comput. 27(1): 1-26 (2024) - [j18]Rami Mohawesh, Muna Al-Hawawreh, Sumbal Maqsood
, Omar AlQudah:
Factitious or fact? Learning textual representations for fake online review detection. Clust. Comput. 27(3): 3307-3322 (2024) - [j17]Muna Al-Hawawreh, Zubair A. Baig, Sherali Zeadally:
AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions. IEEE Internet Things Mag. 7(4): 136-142 (2024) - [j16]Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain
:
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. J. Netw. Comput. Appl. 223: 103809 (2024) - [j15]Muna Al-Hawawreh, M. Shamim Hossain
:
Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework. J. Netw. Comput. Appl. 226: 103888 (2024) - [j14]Muna Al-Hawawreh
, Nour Moustafa, Jill Slay
:
A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Comput. Appl. 36(1): 15-35 (2024) - [j13]Muna Al-Hawawreh
, M. Shamim Hossain
:
Federated Learning-Assisted Distributed Intrusion Detection Using Mesh Satellite Nets for Autonomous Vehicle Protection. IEEE Trans. Consumer Electron. 70(1): 854-862 (2024) - [i7]Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder:
usfAD Based Effective Unknown Attack Detection Focused IDS Framework. CoRR abs/2403.11180 (2024) - [i6]Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder:
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats. CoRR abs/2403.13010 (2024) - [i5]Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder:
Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis. CoRR abs/2403.13013 (2024) - 2023
- [j12]Muna Al-Hawawreh
, Ahamed Aljuhani, Yaser Jararweh:
Chatgpt for cybersecurity: practical applications, challenges, and future directions. Clust. Comput. 26(6): 3421-3436 (2023) - [j11]Mohamed Amine Ferrag
, Othmane Friha
, Burak Kantarci
, Norbert Tihanyi
, Lucas C. Cordeiro
, Mérouane Debbah, Djallel Hamouda
, Muna Al-Hawawreh
, Kim-Kwang Raymond Choo
:
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. IEEE Commun. Surv. Tutorials 25(4): 2654-2713 (2023) - [j10]Muna Al-Hawawreh
, M. Shamim Hossain:
A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Inf. Fusion 99: 101889 (2023) - [j9]Rami Mohawesh
, Shuxiang Xu
, Matthew Springer
, Yaser Jararweh
, Muna Al-Hawawreh
, Sumbal Maqsood
:
An explainable ensemble of multi-view deep learning model for fake review detection. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101644 (2023) - [c8]Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, Robin Doss:
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM. ACNS Workshops 2023: 336-354 - [c7]Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh:
Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. CCGridW 2023: 16-25 - [c6]Muna Al-Hawawreh, Robin Doss:
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment. TrustCom 2023: 434-443 - [i4]Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh:
Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. CoRR abs/2303.11751 (2023) - [i3]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. CoRR abs/2306.10309 (2023) - 2022
- [j8]Muna Al-Hawawreh
, Elena Sitnikova
, Neda Aboutorab
:
X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things. IEEE Internet Things J. 9(5): 3962-3977 (2022) - [c5]Muna Al-Hawawreh, Ibrahim Elgendi, Kumudu S. Munasinghe
:
Ultra Light-weight Encryption for Securing D2D Communication of ESP8266 IoT devices in Wireless Mesh Networks. ISNCC 2022: 1-6 - [d1]Muna Al-Hawawreh
, Elena Sitnikova, Neda Aboutorab:
X-IIoTID: A Connectivity- and Device-agnostic Intrusion Dataset for Industrial Internet of Things. IEEE DataPort, 2022 - 2021
- [j7]Muna Al-Hawawreh
, Elena Sitnikova
, Neda Aboutorab
:
Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT. IEEE Access 9: 148738-148755 (2021) - [j6]Muna Al-Hawawreh
, Elena Sitnikova
:
Developing a Security Testbed for Industrial Internet of Things. IEEE Internet Things J. 8(7): 5558-5573 (2021) - [j5]Muna Al-Hawawreh
, Nour Moustafa
, Sahil Garg
, M. Shamim Hossain
:
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 2968-2981 (2021) - [i2]Rami Mohawesh, Shuxiang Xu, Matthew Springer
, Muna Al-Hawawreh, Sumbal Maqsood
:
Fake or Genuine? Contextualised Text Representation for Fake Review Detection. CoRR abs/2112.14343 (2021) - 2020
- [i1]Muna Al-Hawawreh, Elena Sitnikova:
Developing a Security Testbed for Industrial Internet of Things. CoRR abs/2011.12546 (2020)
2010 – 2019
- 2019
- [j4]Muna Al-Hawawreh
, Frank T. H. den Hartog
, Elena Sitnikova
:
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things. IEEE Internet Things J. 6(4): 7137-7151 (2019) - [j3]Mustafa Hammad, Mohammad Bsoul, Maen Hammad, Muna Al-Hawawreh
:
An Efficient Approach for Representing and Sending Data in Wireless Sensor Networks. J. Commun. 14(2): 104-109 (2019) - [c4]Muna Al-Hawawreh
, Elena Sitnikova
, Frank T. H. den Hartog
:
An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things. BDIOT 2019: 83-87 - [c3]Muna Al-Hawawreh
, Elena Sitnikova
:
Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network. BDIOT 2019: 126-130 - [c2]Muna Al-Hawawreh
, Elena Sitnikova
:
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment. MilCIS 2019: 1-6 - 2018
- [j2]Adnan Rawashdeh, Mouhammd Alkasassbeh, Muna Al-Hawawreh
:
An anomaly-based approach for DDoS attack detection in cloud environment. Int. J. Comput. Appl. Technol. 57(4): 312-324 (2018) - [j1]Muna Al-Hawawreh
, Nour Moustafa
, Elena Sitnikova
:
Identification of malicious activities in industrial internet of things based on deep learning models. J. Inf. Secur. Appl. 41: 1-11 (2018) - 2016
- [c1]Aws Naser
, Mohamed Fadli Bin Zolkipli, Shahid Anwar
, Muna Sulieman Al-Hawawreh
:
Present Status and Challenges in Cloud Monitoring Framework: A Survey. EISIC 2016: 201
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint