Kinoon M.A., Omar M., Mohaisen M., Mohaisen D., Security breaches in the healthcare domain: a spatiotemporal analysis, Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual, 15–17 November 2021, Proceedings 10, 171–183, Springer, 2021.
Omar M., New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Chapter: Insider threats detecting and controlling malicious insiders), 162–172, 2015.
Omar M., VulDefend: A novel technique based on pattern–exploiting training for detecting software vulnerabilities using language models, 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, 22–24 May 2023, Amman, Jordan.
Omar M., Jones R., Burrell D.N., Dawson M., Nobles C., Mohammed D., Bashir A.K., Transformational Interventions for Business, Technology and Healthcare (Chapter 7: Harnessing the power and simplicity of decision trees to detect IoT malware), 215–229, IGI Global, 2023.
Statista. (n.d.), Global smartphone OS market share of Android, https://www.statista.com/statistics/236027/global-smartphone-os-market-share-of-android/, Accessed: December 15, 2023.
Zhou Y., Jiang X., Dissecting android malware: Characterization and evolution, 2012 IEEE Symposium on Security and Privacy, 20–23 May 2012, San Francisco, California, USA.
Felt A.P., Chin E., Hanna S., Song D., Wagner D., Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 17–21 October 2011, Chicago, Illinois, USA.
Omar M., Dawson M., Research in progress-defending android smartphones from malware attacks, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 288–292, IEEE, 2013.
Omar M., Mohammed D., Nguyen V., Dawson M., Banisakher M., Research Anthology on Securing Mobile Technologies and Applications (Chapter 34: Android application security), 610–625, IGI Global, 2021.
Faruki P., Bharmal A., Laxmi V., Ganmoor V., Gaur M.S., Conti M., Rajarajan M., Android security: a survey of issues malware penetration and defenses, IEEE Communications Surveys and Tutorials, 17(2), 998–1022, 2015.
Mohammed D., Omar M., Nguyen V., Security Solutions for Hyperconnectivity and The Internet of Things (Chapter 5: Enhancing cyber security for financial industry through compliance and regulatory standards), 17, 113–129, 2017.
Mohammed D., Omar M., Nguyen V., Wireless sensor network security: approaches to detecting and avoiding wormhole attacks, Journal of Research in Business Economics and Management, 10(2), 1860–1864, 2018.
Ayub M.F., Li X., Mahmood K., Shamshad S., Saleem M.A., Omar M., Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication, IEEE Transactions on Consumer Electronics, 1–10, 2023.
Dawson M., Omar M., Abramson J., Leonard B., Bessette D., Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Chapter 10: Battlefield cyberspace: Exploitation of hyperconnectivity and internet of things), 204–235, 2017.
Omar M., Developing cybersecurity education capabilities at Iraqi universities, 16th Annual Conference of the Midwest Association for Information Systems, 10, 2021.
Omar M., Choi S., Nyang D., Mohaisen D., Quantifying the performance of adversarial training on language models with distribution shifts, 1st Workshop on Cybersecurity and Social Sciences, 30 May 2022, Nagasaki, Japan.
Omar M., Choi S., Nyang D., Mohaisen D., Robust natural language processing: Recent advances challenges and future directions, IEEE Access, 10, 86038–86056, 2022.
Omar M., Sukthankar G., Text-defend: Detecting adversarial examples using local outlier factor, 2023 IEEE 17th International Conference on Semantic Computing, 01–03 February 2023, California, USA.
Saleem M.A., Li X., Mahmood K., Shamshad S., Ayub M.F., Bashir A.K., Omar M., Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3324273, 2023.
Zhou S., Ali A., Al-Fuqaha A., Omar M., Feng L., Robust risk-sensitive task offloading for edge-enabled industrial internet of things, IEEE Transactions on Consumer Electronics, DOI: 10.1109/TCE.2023.3323146, 2023.
Breunig M.M., Kriegel H.P., Raymond T.N., Sander J., LOF: identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 15–18 May 2000, Texas, USA.
Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Drebin: Effective and explainable detection of android malware in your pocket, Proceedings of the Network and Distributed System Security Symposium, Internet Society, 23–26 February 2014, San Diego, California, USA.