Vol. 11/ Núm. 2 2024 pág. 2812
Aljabri, M., Alhaidari, F., Albuainain, A., Alrashidi, S., Alansari, J., Alqahtani, W., & Alshaya,
J. (2024). Ransomware detection based on machine learning using memory features.
Egyptian Informatics Journal, 25. Scopus. https://doi.org/10.1016/j.eij.2024.100445
Aljabri, M., Alhaidari, F., Mohammad, R. M. A., Alhamed, D. H., Altamimi, H. S., & Chrouf, S.
M. B. (2022). An Assessment of Lexical, Network, and Content-Based Features for
Detecting Malicious URLs Using Machine Learning and Deep Learning Models.
Computational Intelligence and Neuroscience, 2022. Scopus.
https://doi.org/10.1155/2022/3241216
Aljahdalic, A. O., Banafee, S., & Aljohani, T. (2024). URL filtering using machine learning
algorithms. Information Security Journal, 33(3), 193-203. Scopus.
https://doi.org/10.1080/19393555.2023.2193350
Aljammal, A. H., taamneh, S., Qawasmeh, A., & Salameh, H. B. (2023). Machine Learning Based
Phishing Attacks Detection Using Multiple Datasets. International Journal of Interactive
Mobile Technologies, 17(5), 71-83. Scopus. https://doi.org/10.3991/ijim.v17i05.37575
Alnemari, S., & Alshammari, M. (2023). Detecting Phishing Domains Using Machine Learning.
Applied Sciences (Switzerland), 13(8). Scopus. https://doi.org/10.3390/app13084649
Alomari, M., Alsadah, S., Aldahmash, N., Alghulaygah, H., Alogaiel, R., & Saqib, N. A. (2024).
A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques
and Mitigation Strategies. 2024 Seventh International Women in Data Science
Conference at Prince Sultan University (WiDS PSU), 215-222.
https://doi.org/10.1109/WiDS-PSU61003.2024.00051
Alsaidi, R. A. M., Yafooz, W. M. S., Alolofi, H., Taufiq-Hail, G. A.-M., Emara, A.-H. M., &
Abdel-Wahab, A. (2022). Ransomware Detection using Machine and Deep Learning
Approaches. International Journal of Advanced Computer Science and Applications,
13(11), 112-119. Scopus. https://doi.org/10.14569/IJACSA.2022.0131112
Alsanad, A., & Altuwaijri, S. (2022). Advanced Persistent Threat Attack Detection using
Clustering Algorithms. International Journal of Advanced Computer Science and
Applications, 13(9), 640-649. Scopus. https://doi.org/10.14569/IJACSA.2022.0130976
Alsubaie, M. S., Atawneh, S. H., & Abual-Rub, M. S. (2023). Building Machine Learning Model
with Hybrid Feature Selection Technique for Keylogger Detection. International Journal
of Advances in Soft Computing and Its Applications, 15(2), 32-53. Scopus.
https://doi.org/10.15849/IJASCA.230720.03
Ayo, F. E., Awotunde, J. B., Folorunso, S. O., Adigun, M. O., & Ajagbe, S. A. (2023). A genomic
rule-based KNN model for fast flux botnet detection. Egyptian Informatics Journal,
24(2), 313-325. Scopus. https://doi.org/10.1016/j.eij.2023.05.002
Benmohamed, E., Thaljaoui, A., Elkhediri, S., Aladhadh, S., & Alohali, M. (2024). E-SDNN:
encoder-stacked deep neural networks for DDOS attack detection. Neural Computing and