I published a total of 40 publications: 10 journal articles (4 under review), 27 conference articles, 11 technical reports, and two lecture notes. The publications are within cybersecurity and computer networks.

More bibliographic information is also available on my Link to Google Scholar Profile . Not all of my publish paper downloads free, however, send me an email if you would like a copy of my publications.

IEEE conference paper presentation paper title “COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks”

Publication list

  1. Jaber, A. N., & Rehman, S. U. (2020). FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing, 1-11. Impact factor 3.458.
  2. Jaber, A. N., Fritsch, L., & Haugerud, H. (2022, February). Improving Phishing Detection with the Grey Wolf Optimizer. In 2022 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-6). IEEE.
  3. Jaber, A. N. (2021, December). Efficient Visualization Framework for Real-Time Monitoring Network Traffic of High-Speed Networks. In 2021 IEEE International Conference on Big Data (Big Data) (pp. 5839-5842). IEEE.
  4. Jaber, A. N., & Fritsch, L. (2021, November). COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks. In 2021 25th International Computer Science and Engineering Conference (ICSEC) (pp. 434-442). IEEE.
  5.  Jaber, A. N., Anwar, S., Khidzir, N. Z. B., & Anbar, M. (2020, December). A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. In International Conference on Advances in Cyber Security (pp. 550-573). Springer, Singapore.
  6. Jaber, A. N., Zolkipli, M. F., Shakir, H. A., & Jassim, M. R. Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing. P2P, Parallel, Grid, Cloud, and Internet Computing (pp. 241-252). Springer.  
  7. Jaber, A. N. &Shakir, H. A., A Short Review for Ransomware: Pros and Cons. P2P, Parallel, Grid, Cloud, and Internet Computing (pp. 401-411). Springer.  
  8. Jaber, A. N, Mohamad Fadli Bin Zolkipli, Mazlina Binti Abdul Majid: Jaber, A. N., Zolkipli, M. F. B., & Majid, M. B. A. (2015). Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing. Journal of Advanced & Applied Sciences (JAAS), 3(5), 152-158.   
  9. Jaber, A. N., Zolkipli, M. F., Mohamad, M. A. M., & Khan, N. U. (2015). Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks. Advances in Information   Sciences and Service Sciences, 7(1), 39.  
  10.  Jaber, A. N, M.F. Bin Zolkipli: Efficient Elliptic Curve Cryptography Encryption Framework for Cloud Computing. International Review on Computers and Software 12/2013; 8(12).
  11.  Jaber, A. N, Supriyanto, Selvakumar Manickam, (2013). Highly Effective Filtration and Prevention Framework for Secure Incoming VoIP Calls. International Journal of Control and Automation, 6(3).
  12. Jaber, A. N., Tan, C. W., Manickam, S. (2012). Session Initiation Protocol Security: A Brief Review. Journal of Computer Science, 8(3), 348.  
  13.  Firas D Ahmed, Mazlina Abdul Majid, Mohd Sharifuddin, Jaber, A. N., Software Agent and Cloud Computing: A Brief Review. 03/2016; 2(2):2289-8522.  
  14.   Jaber, A. N., Mohamad Fadli Zolkipli, Othman Hanshal: A Conceptual Model Using the Elliptic Curve Diffie-Hellman with an Artificial Neural Network Over Cloud Computing. The National Conference for Postgraduate Research (NCON-PGR), Universiti Malaysia Pahang;09/2016
  15.  Shahid Anwar, Jasni Mohamad Zain, Zakira Inayat, Ahmad Karim, Riaz Ul Haq, Jaber, A. N., Static Approach Towards Mobile Botnet Detection. 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand; 08/2016, DOI:10.1109/ICED.2016.7804708.  
  16.   Aws Naser, Mohamed Fadli Zolkipli, Shahid Anwar: Present Status and Challenges in Cloud Monitoring Framework: A Survey. 2016 European Intelligence and Security Informatics Conference (EISIC); 08/2016, DOI:10.1109/EISIC.2016.055.
  17.   Jaber, A. N., Mohamad Fadli Zolkipli, Shahid Anwar, Mazlina Abdul Majid: A Framework for Preventing DDoS Attacks in Cloud Computing. 2016 International Conference on Computer, Communication, and Control Technology – Computer Technology, Kota Kinabalu, Sabah; 04/2016.
  18.   Mohammed Khudhur Hussein, Nasharuddin Bin Zainal, Jaber, A. N., : Data security analysis for DdoS defense of cloud based networks. 2015 IEEE Student Conference on Research and Development (SCOReD); 12/2015, DOI:10.1109/SCORED.2015.7449345.  
  19.  Shahid Anwar, Jasni Muhamad Zain, Mohamad Fadli Zolkipli, Zakira Inayat, Jaber, A. N., Julius Beneoluchi Odili: Response Option for Attacks Detected by Intrusion Detection System. The 4th International Conference on Software Engineering and Computer System, Kuantan, Malaysia; 08/2015, DOI:10.13140/RG.2.1.1609.4566 .
  20.  Firas D. Ahmed, Jaber, A. N., Mazlina Binti Abdul Majid, Mohd Sharifuddin Ahmad: Agent-based Big Data Analytics in Retailing: A case study. 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS); 08/2015, DOI:10.1109/ICSECS.2015.  
  21. Jaber, A. N., MF Zolkipli: Privacy Concerns Due to Class Elements in Cloud Environments Despite Full Homomorphic Encryption. 3rd Science One International Conference Technology; 01/2015.
  22. Jaber, A. N., Mohamad Fadli Zolkipli, Abdul Majid Mazlina, Kamal Zuhaili Zamli: Processing Data in Cloud Environments without the Need for Decryption. ICIT 2015 3rd Science One International Conference on Information Technology, UAE, Dubai; 12/2014.  
  23. Jaber, A. N, Kunalan Dava Rajoo, Selvakumar Manickam, Azlan Bin Osman, Abdulrazzaq Khudher, Chen- Wei Tan: Framework for Enhancing Sip Confidentiality to Prevent Unexpected High Sip Server Attacks by Using Crypto Gateway Sip Server (Cgs). 01/2012; 39.  
  24.  Jaber, A. N., Abdul Mazlina, Majid: Trusting Cloud Computing for Personal Files. International Conference on Information and Communication Technology Convergence; 10/2014.Scopus index
  25.  Jaber, A. N., Mazlina Binti Abdul Majid, Mohamad Fadli Bin Zolkipli, Nusrat Ullah Khan: A Study in Data Security in Cloud Computing. 2014 International Conference on Computer, Communications, and Control Technology (I4CT); 09/2014, DOI:10.1109/I4CT.2014.
  26. Jaber, A. N., Mohamad Fadli Bin Zolkipli: Use of Cryptography in Cloud Computing. IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 11/2013, DOI:10.1109/ICCSCE.2013.
  27.  Ammar Waysi AlTuhafi, Sureswaran Ramadass, Jaber, A. N.: Framework for Adaptable Topology for Peer-To-Peer Live Video Streaming. Business Engineering and Industrial Applications Colloquium (BEIAC), 2013 IEEE; 04/2013, DOI:10.1109/BEIAC.2013.  
  28.   Jaber, A. N, Selvakumar Manickam, Surerswaran Ramdas: A Study of SIP Trunk Security and Challenges. IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA), 11/2012, D0I:10.1109/ICEDSA.2012.6507806.  

Norwegian Computer Scientists