Search Results - "Alazab, Mamoun"
-
1
Profiling and classifying the behavior of malicious codes
Published in The Journal of systems and software (01-02-2015)“…Malware is a major security threat confronting computer systems and networks and has increased in scale and impact from the early days of ICT. Traditional…”
Get full text
Journal Article -
2
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
Published in Computers & security (01-05-2020)“…Both researchers and malware authors have demonstrated that malware scanners are unfortunately limited and are easily evaded by simple obfuscation techniques…”
Get full text
Journal Article -
3
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
Published in IEEE transactions on industrial informatics (01-03-2022)“…In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of…”
Get full text
Journal Article -
4
Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices
Published in IEEE transactions on industrial informatics (01-10-2022)“…Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which…”
Get full text
Journal Article -
5
Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System
Published in IEEE transactions on intelligent transportation systems (01-07-2021)“…It is expected that a mixture of autonomous and manual vehicles will persist as a part of the intelligent transportation system (ITS) for many decades. Thus,…”
Get full text
Journal Article -
6
Blockchain for Industry 4.0: A Comprehensive Review
Published in IEEE access (2020)“…Due to the proliferation of ICT during the last few decades, there is an exponential increase in the usage of various smart applications such as smart farming,…”
Get full text
Journal Article -
7
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
Published in IEEE transactions on vehicular technology (01-08-2020)“…The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during…”
Get full text
Journal Article -
8
Deep Learning Approach for Intelligent Intrusion Detection System
Published in IEEE access (2019)“…Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the…”
Get full text
Journal Article -
9
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems
Published in Sensors (Basel, Switzerland) (30-04-2020)“…The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides…”
Get full text
Journal Article -
10
A Comprehensive Survey for Intelligent Spam Email Detection
Published in IEEE access (2019)“…The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable…”
Get full text
Journal Article -
11
Robust Intelligent Malware Detection Using Deep Learning
Published in IEEE access (2019)“…Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer…”
Get full text
Journal Article -
12
Hand gesture classification using a novel CNN-crow search algorithm
Published in Complex & intelligent systems (01-08-2021)“…Human–computer interaction (HCI) and related technologies focus on the implementation of interactive computational systems. The studies in HCI emphasize on…”
Get full text
Journal Article -
13
Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions
Published in IEEE access (2023)“…The rapid progress in digitalization and automation have led to an accelerated growth in healthcare, generating novel models that are creating new channels for…”
Get full text
Journal Article -
14
Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey
Published in Sustainable cities and society (01-02-2021)“…Since December 2019, the coronavirus disease (COVID-19) outbreak has caused many death cases and affected all sectors of human life. With gradual progression…”
Get full text
Journal Article -
15
A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing
Published in IEEE access (2019)“…To avoid the complex process of explicit feature extraction in traditional facial expression recognition, a face expression recognition method based on a…”
Get full text
Journal Article -
16
Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies
Published in IEEE transactions on big data (01-09-2019)“…Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised…”
Get full text
Journal Article -
17
FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems
Published in Sensors (Basel, Switzerland) (11-02-2022)“…Recent technological developments, such as the Internet of Things (IoT), artificial intelligence, edge, and cloud computing, have paved the way in transforming…”
Get full text
Journal Article -
18
Deep Multiagent Reinforcement-Learning-Based Resource Allocation for Internet of Controllable Things
Published in IEEE internet of things journal (01-03-2021)“…Ultrareliable and low-latency communication (URLLC) is a prerequisite for the successful implementation of the Internet of Controllable Things. In this…”
Get full text
Journal Article -
19
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning
Published in IEEE transactions on computers (01-11-2020)“…The complexity, sophistication, and impact of malware evolve with industrial revolution and technology advancements. This article discusses and proposes a…”
Get full text
Journal Article -
20
Securing smart vehicles from relay attacks using machine learning
Published in The Journal of supercomputing (01-04-2020)“…Due to the rapid developments in intelligent transportation systems, modern vehicles have turned into intelligent transportation means which are able to…”
Get full text
Journal Article