Search Results - "Awad, Ali Ismail"
-
1
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
Published in Sensors (Basel, Switzerland) (08-03-2018)“…The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users…”
Get full text
Journal Article -
2
A Novel Image Steganography Method for Industrial Internet of Things Security
Published in IEEE transactions on industrial informatics (01-11-2021)“…The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private…”
Get full text
Journal Article -
3
An Intelligent Two-Layer Intrusion Detection System for the Internet of Things
Published in IEEE transactions on industrial informatics (01-01-2023)“…The Internet of Things (IoT) has become an enabler paradigm for different applications, such as healthcare, education, agriculture, smart homes, and recently,…”
Get full text
Journal Article -
4
Intrusion detection systems for IoT-based smart environments: a survey
Published in Journal of cloud computing : advances, systems and applications (01-12-2018)“…One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has…”
Get full text
Journal Article -
5
Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions
Published in IEEE transactions on industrial informatics (01-02-2024)“…The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification , to improve accountability for unmanned aerial…”
Get full text
Journal Article -
6
PAIRED: An Explainable Lightweight Android Malware Detection System
Published in IEEE access (2022)“…With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android…”
Get full text
Journal Article -
7
Efficient Approach for Anomaly Detection in IoT Using System Calls
Published in Sensors (Basel, Switzerland) (06-01-2023)“…The Internet of Things (IoT) has shown rapid growth and wide adoption in recent years. However, IoT devices are not designed to address modern security…”
Get full text
Journal Article -
8
An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques
Published in IEEE access (2019)“…Pixel value differencing (PVD) and least significant bit substitution (LSB) are two widely used schemes in image steganography. These two methods do not…”
Get full text
Journal Article -
9
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security
Published in Sensors (Basel, Switzerland) (16-06-2022)“…Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of…”
Get full text
Journal Article -
10
Automatic brain-tumor diagnosis using cascaded deep convolutional neural networks with symmetric U-Net and asymmetric residual-blocks
Published in Scientific reports (25-04-2024)“…The use of various kinds of magnetic resonance imaging (MRI) techniques for examining brain tissue has increased significantly in recent years, and manual…”
Get full text
Journal Article -
11
Bag-of-Visual-Words for Cattle Identification from Muzzle Print Images
Published in Applied sciences (15-11-2019)“…Cattle, buffalo and cow identification plays an influential role in cattle traceability from birth to slaughter, understanding disease trajectories and…”
Get full text
Journal Article -
12
Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks
Published in EURASIP journal on image and video processing (30-09-2018)“…Brain tumour is a serious disease, and the number of people who are dying due to brain tumours is increasing. Manual tumour diagnosis from magnetic resonance…”
Get full text
Journal Article -
13
Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges
Published in IEEE access (01-01-2018)“…The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication…”
Get full text
Journal Article -
14
A Conversational AI Bot for Efficient Learning: A Prototypical Design
Published in IEEE access (2024)“…In an ideal world, how individuals learn should align with the methods they are taught. However, this is not always the case, and it is necessary to reconsider…”
Get full text
Journal Article -
15
Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models
Published in Future internet (01-11-2022)“…In today’s world, phishing attacks are gradually increasing, resulting in individuals losing valuables, assets, personal information, etc., to unauthorized…”
Get full text
Journal Article -
16
Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
Published in Future internet (01-10-2024)“…In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service…”
Get full text
Journal Article -
17
Automatic mapping of configuration options in software using static analysis
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…Configuration errors are some of the main reasons for software failures. Some configuration options may even negatively impact the software’s security, so that…”
Get full text
Journal Article -
18
From classical methods to animal biometrics: A review on cattle identification and tracking
Published in Computers and electronics in agriculture (01-04-2016)“…•A review on the evolution of cattle identification and tracking methods is presented.•Classical methods do not cope with the current cattle identification…”
Get full text
Journal Article -
19
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Published 01-04-2024“…Journal of Network and Computer Applications, Elsevier, 2023 Globally, the external internet is increasingly being connected to industrial control systems. As…”
Get full text
Journal Article -
20
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Published in Journal of network and computer applications (01-11-2023)“…Globally, the external internet is increasingly being connected to industrial control systems. As a result, there is an immediate need to protect these…”
Get full text
Journal Article