Search Results - "Barka, Ezedin"

Refine Results
  1. 1

    Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics by Djenna, Amir, Barka, Ezedin, Benchikh, Achouak, Khadir, Karima

    Published in Sensors (Basel, Switzerland) (01-07-2023)
    “…Cybercriminals are becoming increasingly intelligent and aggressive, making them more adept at covering their tracks, and the global epidemic of cybercrime…”
    Get full text
    Journal Article
  2. 2

    Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure by Barka, Ezedin, Kerrache, Chaker Abdelaziz, Benkraouda, Hadjer, Shuaib, Khaled, Ahmad, Farhan, Kurugollu, Fatih

    “…With the exponential growth in the number of vital infrastructures such as nuclear plants and transport and distribution networks, these systems have become…”
    Get full text
    Journal Article
  3. 3

    A Trusted Lightweight Communication Strategy for Flying Named Data Networking by Barka, Ezedin, Kerrache, Chaker Abdelaziz, Hussain, Rasheed, Lagraa, Nasreddine, Lakas, Abderrahmane, Bouk, Safdar Hussain

    Published in Sensors (Basel, Switzerland) (15-08-2018)
    “…Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs)…”
    Get full text
    Journal Article
  4. 4

    Resource-Aware Federated Hybrid Profiling for Edge Node Selection in Federated Patient Similarity Network by Navaz, Alramzana Nujum, Kassabi, Hadeel T. El, Serhani, Mohamed Adel, Barka, Ezedin S.

    Published in Applied sciences (01-12-2023)
    “…The widespread adoption of edge computing for resource-constrained devices presents challenges in computational straggler issues, primarily due to the…”
    Get full text
    Journal Article
  5. 5

    Efficient Hybrid Fault-Management Clustering Algorithm (HFMCA) in WBANs Based on Weighted Bipartite Graph by Khater, Heba M., Sallabi, Farag, Serhani, Mohamed Adel, Turaev, Sherzod, Barka, Ezedin

    Published in IEEE access (01-01-2023)
    “…Wireless Body Area networks (WBANs) have been adopted extensively in academic and industrial research and development in recent years. WBANs promise to provide…”
    Get full text
    Journal Article
  6. 6

    Empowering Healthcare With Cyber-Physical System-A Systematic Literature Review by Khater, Heba M., Sallabi, Farag, Serhani, Mohamed Adel, Barka, Ezedin, Shuaib, Khaled, Tariq, Asadullah, Khayat, Mohamad

    Published in IEEE access (2024)
    “…Cyber-physical systems (CPS) are recognized for their intelligence as they seamlessly interact with humans, enhancing the physical world through computation,…”
    Get full text
    Journal Article
  7. 7

    Implementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records by Barka, Ezedin, Al Baqari, Mohammed, Kerrache, Chaker Abdelaziz, Herrera-Tapia, Jorge

    Published in Journal of sensor and actuator networks (01-12-2022)
    “…The use of Electronic Health Record (EHR) systems has emerged with the continuous advancement of the Internet of Things (IoT) and smart devices. This is driven…”
    Get full text
    Journal Article
  8. 8

    Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects by Tariq, Asadullah, Serhani, Mohamed Adel, Sallabi, Farag M., Barka, Ezedin S., Qayyum, Tariq, Khater, Heba M., Shuaib, Khaled A.

    “…Federated Learning (FL) emerged as a significant advancement in the field of Artificial Intelligence (AI), enabling collaborative model training across…”
    Get full text
    Journal Article
  9. 9

    UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication by Calafate, Carlos T., Lakas, A., Lagraa, Nasreddine, Kerrache, Chaker Abdelaziz, Barka, E., Cano, Juan Carlos

    Published in Journal of advanced transportation (01-01-2018)
    “…Ensuring the desired level of security is an important issue in all communicating systems, and it becomes more challenging in wireless environments. Flying Ad…”
    Get full text
    Journal Article
  10. 10

    Secure Plug-in Electric Vehicle (PEV) Charging in a Smart Grid Network by Shuaib, Khaled, Barka, Ezedin, Abdella, Juhar, Sallabi, Farag, Abdel-Hafez, Mohammed, Al-Fuqaha, Ala

    Published in Energies (Basel) (01-07-2017)
    “…[...]a user’s sensitive information should be protected both from external electricity providers and other third parties. Besides users’ privacy issues, there…”
    Get full text
    Journal Article
  11. 11

    Cognitive Radio for Smart Grid with Security Considerations by Shuaib, Khaled, Barka, Ezedin, Al Hussien, Nedaa, Abdel-Hafez, Mohammed, Alahmad, Mahmoud

    Published in Computers (Basel) (01-06-2016)
    “…In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area…”
    Get full text
    Journal Article
  12. 12

    Towards a national trauma registry for the United Arab Emirates by Shaban, Sami, Eid, Hani O, Barka, Ezedin, Abu-Zidan, Fikri M

    Published in BMC research notes (10-07-2010)
    “…Trauma is a major health problem in the United Arab Emirates (UAE) as well as worldwide. Trauma registries provide large longitudinal databases for analysis…”
    Get full text
    Journal Article
  13. 13

    Blockchain in Internet-of-Things: Architecture, Applications and Research Directions by Ahmad, Farhan, Ahmad, Zeeshan, Kerrache, Chaker Abdelaziz, Kurugollu, Fatih, Adnane, Asma, Barka, Ezedin

    “…The emergence of Internet-of-Things (IoT) has attracted a massive response from different stakeholders including industry, academia and research community due…”
    Get full text
    Conference Proceeding
  14. 14

    AI-powered biometrics for Internet of Things security: A review and future vision by Awad, Ali Ismail, Babu, Aiswarya, Barka, Ezedin, Shuaib, Khaled

    “…Biometrics is a set of advanced technologies that use the physical or behavioral characteristics of individuals to provide reliable access control. With the…”
    Get full text
    Journal Article
  15. 15

    The role of national cybersecurity strategies on the improvement of cybersecurity education by AlDaajeh, Saleh, Saleous, Heba, Alrabaee, Saed, Barka, Ezedin, Breitinger, Frank, Raymond Choo, Kim-Kwang

    Published in Computers & security (01-08-2022)
    “…Digital information and telecommunication technologies have not only become essential to individuals’ daily lives but also to a nation’s sustained economic…”
    Get full text
    Journal Article
  16. 16

    ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning by Alani, Mohammed M., Awad, Ali Ismail, Barka, Ezedin

    Published in Internet of things (Amsterdam. Online) (01-10-2023)
    “…The proliferation of the Internet of Things (IoT) devices and application domains has made IoT security an unavoidable challenge. Spoofing the address…”
    Get full text
    Journal Article
  17. 17

    UAV-assisted technique for the detection of malicious and selfish nodes in VANETs by Kerrache, Chaker Abdelaziz, Lakas, Abderrahmane, Lagraa, Nasreddine, Barka, Ezedin

    Published in Vehicular Communications (01-01-2018)
    “…Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative…”
    Get full text
    Journal Article
  18. 18

    Blockchain-based multi-diagnosis deep learning application for various diseases classification by Rahal, Hakima Rym, Slatnia, Sihem, Kazar, Okba, Barka, Ezedin, Harous, Saad

    “…Misdiagnosis is a critical issue in healthcare, which can lead to severe consequences for patients, including delayed or inappropriate treatment, unnecessary…”
    Get full text
    Journal Article
  19. 19

    Integrating Blockchain and IoT/ITS for Safer Roads by Ali, Najah Abu, Taha, Abd-Elhamid M., Barka, Ezedin

    Published in IEEE network (01-01-2020)
    “…Road safety continues to be a great concern despite various advances and initiatives. Sweden introduced the SS approach in 1996 as part of a plan to eliminate…”
    Get full text
    Journal Article
  20. 20

    SDNBased Secure Healthcare Monitoring System(SDN-SHMS) by Khayat, Mohamad, Barka, Ezedin, Sallabi, Farag

    “…Healthcare experts and researchers have been promoting the need for IoT-based remote health monitoring systems that take care of the health of elderly people…”
    Get full text
    Conference Proceeding