A survey on wireless body area networks: Architecture, security challenges and research opportunities MS Hajar, MO Al-Kadri, HK Kalutarage Computers & Security 104, 102211, 2021 | 128 | 2021 |
Android mobile malware detection using machine learning: A systematic review J Senanayake, H Kalutarage, MO Al-Kadri Electronics 10 (13), 1606, 2021 | 69 | 2021 |
Ai-based intrusion detection systems for in-vehicle networks: A survey S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ... ACM Computing Surveys 55 (11), 1-40, 2023 | 53 | 2023 |
Full-duplex small cells for next generation heterogeneous cellular networks: A case study of outage and rate coverage analysis MO Al-Kadri, Y Deng, A Aijaz, A Nallanathan IEEE Access 5, 8025-8038, 2017 | 44 | 2017 |
An energy-efficient full-duplex MAC protocol for distributed wireless networks MO Al-Kadri, A Aijaz, A Nallanathan IEEE Wireless Communications Letters 5 (1), 44-47, 2015 | 42 | 2015 |
Android source code vulnerability detection: a systematic literature review J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras ACM Computing Surveys 55 (9), 1-37, 2023 | 33 | 2023 |
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019 | 23 | 2019 |
Keep the moving vehicle secure: Context-aware intrusion detection system for in-vehicle CAN bus security S Rajapaksha, H Kalutarage, MO Al-Kadri, G Madzudzo, AV Petrovski 2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022 | 21 | 2022 |
Developing secured android applications by mitigating code vulnerabilities with machine learning J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 14 | 2022 |
Ltms: A lightweight trust management system for wireless medical sensor networks MS Hajar, MO Al-Kadri, H Kalutarage 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 13 | 2020 |
Resource efficient boosting method for IoT security monitoring I Zakariyya, MO Al-Kadri, H Kalutarage 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021 | 10 | 2021 |
Ai-powered vulnerability detection for secure source code development S Rajapaksha, J Senanayake, H Kalutarage, MO Al-Kadri International Conference on Information Technology and Communications …, 2022 | 9 | 2022 |
On Full Duplex Wireless Networks: PHY, MAC and Network Layers Perspective MO Alkadri King's College London, 2017 | 9* | 2017 |
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring I Zakariyya, H Kalutarage, MO Al-Kadri Computers & Security 133, 103388, 2023 | 8 | 2023 |
Ergodic capacity of interference coordinated hetnet with full-duplex small cells MO Al-Kadri, A Aijaz, A Nallanathan Proceedings of European Wireless 2015; 21th European Wireless Conference, 1-6, 2015 | 8 | 2015 |
X-FDR: A cross-layer routing protocol for multihop full-duplex wireless networks MO Al-Kadri, A Aijaz, A Nallanathan IEEE wireless communications 26 (2), 70-77, 2018 | 6 | 2018 |
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras IFIP Annual Conference on Data and Applications Security and Privacy, 339-357, 2023 | 5 | 2023 |
Improving in-vehicle networks intrusion detection using on-device transfer learning S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo Symposium on vehicles security and privacy 10, 2023 | 5 | 2023 |
Etaree: An effective trend-aware reputation evaluation engine for wireless medical sensor networks MS Hajar, MO Al-Kadri, H Kalutarage 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 5 | 2020 |
Resource efficient federated deep learning for IoT security monitoring I Zakariyya, H Kalutarage, MO Al-Kadri International Workshop on Attacks and Defenses for Internet-of-Things, 122-142, 2022 | 4 | 2022 |