1. Abu-Nimeh, S., Chen, T., Alzubi, O., 2011. Malicious and spam posts in online social networks. Computer 44, 23–28. doi:10.1109/MC. 2011.222.
2. Al Messabi, K., Aldwairi, M., Al Yousif, A., Thoban, A., Belqasmi, F., 2018. Malware detection using dns records and domain name features”, in: International Conference on Future Networks and Distributed Systems (ICFNDS), ACM. URL: https://doi.org/10.1145/3231053.3231082
3. Pattern matching of signature-based ids using myers algorithm under mapreduce framework;Aldwairi;EURASIP J. Information Security,2017
4. Aldwairi, M., Al-Salman, R., 2011. Malurls: Malicious urls classification system, in: Annual International Conference on Information Theory and Applications, GSTF Digital Library (GSTF-DL), Singapore. doi:10.5176/978-981-08-8113-9_ITA2011-29. the best paper award.
5. Flukes: Autonomous log forensics, intelligence and visualization tool;Aldwairi;Proceedings of the International Conference on Future Networks and Distributed Systems,2017