\n \n \n
\n
\n\n \n \n \n \n \n \n Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; and Goldsmith, M.\n\n\n \n\n\n\n In
2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019, pages 98–103, 2019. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/NouhNG19,\n author = {Mariam Nouh and\n Jason R. C. Nurse and\n Michael Goldsmith},\n title = {Understanding the Radical Mind: Identifying Signals to Detect Extremist\n Content on Twitter},\n booktitle = {2019 {IEEE} International Conference on Intelligence and Security\n Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019},\n pages = {98--103},\n publisher = {{IEEE}},\n year = {2019},\n url = {https://doi.org/10.1109/ISI.2019.8823548},\n doi = {10.1109/ISI.2019.8823548},\n timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},\n biburl = {https://dblp.org/rec/conf/isi/NouhNG19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Towards Designing a Multipurpose Cybercrime Intelligence Framework.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; and Goldsmith, M.\n\n\n \n\n\n\n In Brynielsson, J.; and Johansson, F., editor(s),
2016 European Intelligence and Security Informatics Conference, EISIC 2016, Uppsala, Sweden, August 17-19, 2016, pages 60–67, 2016. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/eisic/NouhNG16,\n author = {Mariam Nouh and\n Jason R. C. Nurse and\n Michael Goldsmith},\n editor = {Joel Brynielsson and\n Fredrik Johansson},\n title = {Towards Designing a Multipurpose Cybercrime Intelligence Framework},\n booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC}\n 2016, Uppsala, Sweden, August 17-19, 2016},\n pages = {60--67},\n publisher = {{IEEE} Computer Society},\n year = {2016},\n url = {https://doi.org/10.1109/EISIC.2016.018},\n doi = {10.1109/EISIC.2016.018},\n timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/eisic/NouhNG16.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Identifying Key-Players in Online Activist Groups on the Facebook Social Network.\n \n \n \n \n\n\n \n Nouh, M.; and Nurse, J. R. C.\n\n\n \n\n\n\n In
IEEE International Conference on Data Mining Workshop, ICDMW 2015, Atlantic City, NJ, USA, November 14-17, 2015, pages 969–978, 2015. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/NouhN15,\n author = {Mariam Nouh and\n Jason R. C. Nurse},\n title = {Identifying Key-Players in Online Activist Groups on the Facebook\n Social Network},\n booktitle = {{IEEE} International Conference on Data Mining Workshop, {ICDMW} 2015,\n Atlantic City, NJ, USA, November 14-17, 2015},\n pages = {969--978},\n publisher = {{IEEE} Computer Society},\n year = {2015},\n url = {https://doi.org/10.1109/ICDMW.2015.88},\n doi = {10.1109/ICDMW.2015.88},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icdm/NouhN15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A malicious activity detection system utilizing predictive modeling in complex environments.\n \n \n \n \n\n\n \n Almaatouq, A.; Alabdulkareem, A.; Nouh, M.; Alsaleh, M.; Alarifi, A.; Sanchez, A.; Alfaris, A.; and Williams, J. R.\n\n\n \n\n\n\n In
11th IEEE Consumer Communications and Networking Conference, CCNC 2014, Las Vegas, NV, USA, January 10-13, 2014, pages 371–379, 2014. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccnc/AlmaatouqANAASAW14,\n author = {Abdullah Almaatouq and\n Ahmad Alabdulkareem and\n Mariam Nouh and\n Mansour Alsaleh and\n Abdulrahman Alarifi and\n Abel Sanchez and\n Anas Alfaris and\n John R. Williams},\n title = {A malicious activity detection system utilizing predictive modeling\n in complex environments},\n booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC}\n 2014, Las Vegas, NV, USA, January 10-13, 2014},\n pages = {371--379},\n publisher = {{IEEE}},\n year = {2014},\n url = {https://doi.org/10.1109/CCNC.2014.6866597},\n doi = {10.1109/CCNC.2014.6866597},\n timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/ccnc/AlmaatouqANAASAW14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.\n \n \n \n \n\n\n \n Mouheb, D.; Talhi, C.; Nouh, M.; Lima, V.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n In Lee, R. Y.; Ormandjieva, O.; Abran, A.; and Constantinides, C., editor(s),
Software Engineering Research, Management and Applications 2010 [selected papers from the 8th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2010, Montreal, Canada, May 24-26, 2010], volume 296, of
Studies in Computational Intelligence, pages 197–213, 2010. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10,\n author = {Djedjiga Mouheb and\n Chamseddine Talhi and\n Mariam Nouh and\n Vitor Lima and\n Mourad Debbabi and\n Lingyu Wang and\n Makan Pourzandi},\n editor = {Roger Y. Lee and\n Olga Ormandjieva and\n Alain Abran and\n Constantinos Constantinides},\n title = {Aspect-Oriented Modeling for Representing and Integrating Security\n Concerns in {UML}},\n booktitle = {Software Engineering Research, Management and Applications 2010 [selected\n papers from the 8th {ACIS} International Conference on Software Engineering\n Research, Management and Applications, {SERA} 2010, Montreal, Canada,\n May 24-26, 2010]},\n series = {Studies in Computational Intelligence},\n volume = {296},\n pages = {197--213},\n publisher = {Springer},\n year = {2010},\n url = {https://doi.org/10.1007/978-3-642-13273-5\\_13},\n doi = {10.1007/978-3-642-13273-5\\_13},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.\n \n \n \n \n\n\n \n Mouheb, D.; Alhadidi, D.; Nouh, M.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n In Barbosa, L. S.; and Lumpe, M., editor(s),
Formal Aspects of Component Software - 7th International Workshop, FACS 2010, Guimarães, Portugal, October 14-16, 2010, Revised Selected Papers, volume 6921, of
Lecture Notes in Computer Science, pages 182–199, 2010. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/facs2/MouhebANDWP10,\n author = {Djedjiga Mouheb and\n Dima Alhadidi and\n Mariam Nouh and\n Mourad Debbabi and\n Lingyu Wang and\n Makan Pourzandi},\n editor = {Lu{\\'{\\i}}s Soares Barbosa and\n Markus Lumpe},\n title = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic\n Framework},\n booktitle = {Formal Aspects of Component Software - 7th International Workshop,\n {FACS} 2010, Guimar{\\~{a}}es, Portugal, October 14-16, 2010, Revised\n Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {6921},\n pages = {182--199},\n publisher = {Springer},\n year = {2010},\n url = {https://doi.org/10.1007/978-3-642-27269-1\\_11},\n doi = {10.1007/978-3-642-27269-1\\_11},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n\n\n\n