• 19 Citations
  • 2 h-Index
20142020
If you made any changes in Pure these will be visible here soon.

Research Output 2014 2020

  • 19 Citations
  • 2 h-Index
  • 7 Conference paper
  • 1 Article
  • 1 Doctoral Thesis
2020

Protecting code injection attacks in intelligent transportation system

Alnabulsi, H. & Islam, R., 02 Jan 2020, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 799-806 8 p. 8887396. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019; vol. 2019-January).

Research output: Book chapter/Published conference paperConference paper

Access control
Railroad cars
Internet
Attack
Intelligent transportation systems
2019
73 Downloads (Pure)

Defending web vulnerabilities against code injection attacks

Alnabulsi, H., 2019, Australia: Charles Sturt University. 237 p.

Research output: ThesisDoctoral Thesis

Open Access
File
Websites
Internet
Terrorism
World Wide Web
Processing

Identification of illegal forum activities inside the Dark Net

Alnabulsi, H. & Islam, MD. R., 17 Jan 2019, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE). Kyu Rhee, P. & Bashar, M. R. (eds.). Piscataway, NJ, USA: IEEE, p. 22-29 8 p.

Research output: Book chapter/Published conference paperConference paper

Internet
Terrorism
Routers
Lighting
Violence

Web sanitization from malicious code injection attacks

Alnabulsi, H. & Islam, R., 2019, International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 - Applications and Techniques in Cyber Security and Intelligence. Atiquzzaman, M., Xu, Z., Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., p. 251-261 11 p. (Advances in Intelligent Systems and Computing; vol. 842).

Research output: Book chapter/Published conference paperConference paper

Websites
HTML
Web browsers
2018
2 Citations (Scopus)

A novel algorithm to protect code injection attacks

Alnabulsi, H., Islam, R. & Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
5 Downloads (Pure)

GMSA: Gathering Multiple Signatures Approach to Defend against Code Injection Attacks

Alnabulsi, H., Islam, R. & Talukder, M., 30 Nov 2018, In : IEEE Access. 6, p. 77829 - 77840 11 p.

Research output: Contribution to journalArticle

Open Access
File
Processing
2017

Identification of susceptible websites from code injection attack

Alnabulsi, H. & Islam, MD. R., 2017, Proceedings of the 1st International Conference on Machine Learning and Data Engineering. p. 1-9 9 p.

Research output: Book chapter/Published conference paperConference paper

Websites
Malware
2015
2 Downloads (Pure)

Defence against code injection attacks

Alnabulsi, H., Mamun, Q., Islam, MD. R. & Chowdhury, M. U., 2015, Proceedings of the International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014. Tian, M., Jing, S. & Jing, J. (eds.). Switzerland: Springer, Vol. 153. p. 237-251 15 p.

Research output: Book chapter/Published conference paperConference paper

Multiplexing
Flow control
Internet
2014
16 Citations (Scopus)

Detecting SQL injection attacks using SNORT IDS

Alnabulsi, H., Islam, MD. R. & Mamun, Q., 2014, APWC on CSE 2014. United States: IEEE Xplore, p. 1-7 7 p.

Research output: Book chapter/Published conference paperConference paper

Security of data
Application programs
Internet
Defects