Khalid Albulayhi

ORCID: 0000-0001-6084-2283
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Adversarial Robustness in Machine Learning
  • Access Control and Trust
  • Blockchain Technology Applications and Security
  • Privacy, Security, and Data Protection

Princess Sumaya University for Technology
2023

University of Idaho
2020-2022

The Internet of Things (IoT) ecosystem has experienced significant growth in data traffic and consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self-protective tools against various cyber-attacks. However, IoT IDS systems face challenges due to functional physical diversity. These characteristics make exploiting all features attributes for self-protection difficult unrealistic. This paper proposes implements a novel feature selection extraction approach...

10.3390/app12105015 article EN cc-by Applied Sciences 2022-05-16

Nowadays, IoT technology has become an essential part of many aspects life and business. Nevertheless, such widespread application come at the cost security concerns that threaten data privacy diminish utilization momentum in critical applications as smart grid intelligent transportation systems. To address this challenge, several approaches have been proposed to detect prevent cyberthreats from materializing. Anomaly detection is one these defines boundaries legitimate (normal) behavior....

10.1109/aiiot52608.2021.9454168 article EN 2022 IEEE World AI IoT Congress (AIIoT) 2021-05-10

Access control is one of the imperative defense frontlines for digital computing environments especially pervasive such as cloud and internet things (IoT) characterized by heterogeneous distributed services resources. Although, numerous access models (ACM) have been implemented used to prevent unauthorized resources, these may not prove efficacious overexposure underexposure data. More granular or fine-grained therefore are developed enable more itemized authorization policies. This paper...

10.1109/ccwc47524.2020.9031179 article EN 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020-01-01

Public availability of electronic health records raises major privacy concerns, as that data contains confidential personal information individuals. Publishing such must be accompanied by appropriate privacy-preserving techniques to avoid or at least minimize breaches. The task preservation becomes even more challenging when the have multiple sensitive attributes (SAs). Privacy risks increase further an individual has (1:M) in a dataset, rather typical situation with (EHRs). To overcome...

10.1109/cscloud-edgecom49738.2020.00024 article EN 2020-08-01

In this study, we propose a predictive model for forecasting future ransomware and malware attacks based on the previous time series data from 2005–2021. We use time-series regression technique that relies neural network algorithm to estimate of in years over time. Our experiment has applied two hidden layers with optimal parameter (weight biases). modify our terms building predict short-term values up 2026. To reach minimum potential training error, train 60 epochs achieve Mean Square Error...

10.1109/cicn56167.2022.10008270 article EN 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN) 2022-12-04

Using deep learning networks, anomaly detection systems have seen better performance and precision.However, adversarial examples render learning-based insecure since keekcatta can fool them, increasing the attack success rate.Therefore, improving systems' robustness against attacks is imperative.This paper tests three models based on Convolutional Neural Network (CNN), Long Short-term Memory (LSTM), Deep Belief (DBN).It assesses susceptibility of current datasets (in particular, UNSW-NB15...

10.5815/ijwmt.2023.04.01 article EN International Journal of Wireless and Microwave Technologies 2023-08-08
Coming Soon ...