- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Network Packet Processing and Optimization
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Anomaly Detection Techniques and Applications
- Mobile Ad Hoc Networks
- Terrorism, Counterterrorism, and Political Violence
- Energy Efficient Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Speech and dialogue systems
- Experimental Learning in Engineering
- IoT and Edge/Fog Computing
- IPv6, Mobility, Handover, Networks, Security
- Digital and Cyber Forensics
- Multi-Agent Systems and Negotiation
- User Authentication and Security Systems
- Security in Wireless Sensor Networks
- Spam and Phishing Detection
- Privacy-Preserving Technologies in Data
- UAV Applications and Optimization
- Biometric Identification and Security
- Service-Oriented Architecture and Web Services
- Opportunistic and Delay-Tolerant Networks
- Robotics and Automated Systems
United Arab Emirates University
2016-2025
Abu Dhabi University
2022
Manouba University
2017
École Normale Supérieure - PSL
2008
Institut Supérieur des Études Technologiques en Communications de Tunis
2004
Pace University
2002-2003
Effective classroom instruction requires monitoring student participation and interaction during class, identifying cues to simulate their attention. The ability of teachers analyze evaluate students’ behavior is becoming a crucial criterion for quality teaching. Artificial intelligence (AI)-based recognition techniques can help attention engagement sessions. With rapid digitalization, the global education system adapting exploring emerging technological innovations, such as AI, Internet...
Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology support agricultural efficiency. In large-scale agriculture, role of unmanned aerial vehicles (UAVs) has increased monitoring collecting farm data at regular intervals. However, an open environment, UAVs can be hacked malfunction report false data. Due limited battery life flight times requiring frequent recharging, a compromised UAV wastes precious energy...
Streaming data is one of the attention receiving sources for concept-evolution studies. When a new class occurs in stream it can be considered as concept and so concept-evolution. One attractive problem occurring studies recurring classes from our previous study. In streams, disappear reappear after while. Existing on classification techniques either misclassify or falsely identify novel classes. Because misclassification false classification, error rates increases those this paper we...
Fog computing has proved its importance over legacy cloud architectures for computation, storage, and communication where edge devices are used to facilitate the delay-sensitive applications. The inception of fog nodes brought intelligence close end-devices. Many frameworks have been proposed computation. In this paper, we a simulation framework that can use end handle peak computation load provide better Quality Services (QoS). regional deployed at network locations which as an intelligent...
Smart vehicles are equipped with onboard computing units designed to run in-vehicle applications. However, due limited power, the unable execute compute-intensive tasks and those that require near real-time processing. Therefore offloaded nearby fog/edge devices have more powerful processors. fog static, placed at fixed locations such as intersections, a communication range. Therefore, they can only facilitate in their immediate vicinity areas of city be covered provide services on demand....
This article presents a scientometric and literature analysis of current research on ChatGPT, conversational AI technology developed by OpenAI. Using various databases, 103 relevant articles were retrieved analyzed through scientometric, quantitative, application-based approaches. A Google trend comparison with other generative chatbot technologies also carried out. The study provides insights into the distribution ChatGPT publications across different countries regions, network co-occurring...
Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection remote areas due to their mobility. The collected require processing close the end-user support delay-sensitive applications. In this paper, we proposed a scheme and scheduling framework for smart farms. We categorized model into two phases: scheduling. phase, IoT sensors are deployed randomly form cluster based on RSSI. UAV calculates optimum trajectory order gather from all clusters. offloads nearest...
Maintaining interconnectivity between dynamic vehicular nodes and ensuring trust in networking is still a challenging issue. It crucial for the environments to maintain stable further prevent from broadcasting fake messages simultaneously protect vehicles against tracking attacks. An efficient Trust Management System (TMS) proposed this paper that will ensure trustworthiness entities assure road safety reliable communication. The approach incorporates novel timestamp mechanism block chain...
Abstract The Industrial Internet of Things (IIoTs) is an emerging area that forms the collaborative environment for devices to share resources. In IIoT, many sensors, actuators, and other are used improve industrial efficiency. As most mobile; therefore, impact mobility can be seen in terms low-device utilization. Thus, time, available resources underutilized. Therefore, inception fog computing model IIoT has reduced communication delay executing complex tasks. However, it not feasible cover...
Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could in form computer virus, spy programs, terrorist messages, etc. Most available techniques proposed covert that use the upper layers OSI model. In this paper, we discuss a novel channel data link layer dedicated wireless local area networks. Depending on configuration network, uses either sequence control or initial vector fields, both them. We present also some...
The development of Smart Grid power systems is gaining momentum in many countries leading to massive deployment smart meters realize the envisioned benefits. However, there are several concerns among consumer communities and service providers with respect information security when it comes meters. This paper attempts address main challenge related grid by examining resiliency threats attacks. Several common attacks being used study their impact on performance a controlled laboratory...
Among various types of attacks on an Ethernet network, a "sniffing attack" is probably one the most difficult to handle. Sniffers are programs that allow host capture any packets in by putting host's network interface card (NIC) into promiscuous mode. When NIC normal mode, it captures only sent host. Since many basic services, such as FTP and SMTP, send passwords data clear text packets, can be used hackers confidential data. This paper presents design implementation two different techniques...
Intrusion detection is a mechanism used to detect various attacks on wired or wireless network. Port scanning one of the dangerous that intrusion tries detect. Snort, famous network system (NIDS), detects port attack by combining and analyzing traffic parameters. Because these parameters cannot be easily combined using mathematical formula, fuzzy logic can combine them; also reduce number false alarms. This paper presents novel approach, based logic, attacks. A controller designed integrated...
This paper presents a mechanism to improve firewall packet filtering time through optimizing the order of security policy fields for early rejection. The proposed is based on optimization according traffic statistics. Furthermore, uses multilevel filtering, and in each level unwanted packets are rejected as possible. So, can be considered also device protection against denial service (DoS) attacks targeting default rule. In addition, acceptance done using splay tree data structure which...
Teaching ethical hacking techniques is fundamental to security education and allows students better understand the ways in which computer network systems fail. This paper discusses implementation of comprehensive offensive hands-on lab exercises about four common Denial Service (DoS) attacks. Moreover, a defense technique against DoS attacks using Snort tool, as an intrusion detection system. The impact offering on student performance terms achieving course outcomes also discussed. Although...
The emergence of web 2.0 virtual spaces, namely social networks and media, enables terrorist organizations to flourish advance their cyber malicious activities by posting criminal contents, exchanging information polarizing new members. Thus, there is an immense need for the development effective approaches understand structures, working strategies, operation tactics. A community a set subgroups, which share many properties but differ on others, such as degree activity roles. identification...
In this paper we propose a novel covert channel for exchanging secret information, based on the IP header record route options. Instead of encrypting message or embedding it into multimedia object, as in traditional steganography, process entire and generate several packets with different types to carry information. Thereby foil an eavesdropper who is primarily applying statistical tests detect encrypted channels. We show that our approach provides more protection against steganalysis...
ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution problem by extending current protocol implementation. Instead traditional stateless cache, we use stateful order manage secure cache. We also novel Fuzzy Logic approach differentiate between normal malicious replies. The controller uses dynamically populated data base that adapts network changes. limits approaches are discussed analyzed.
The field of academic security education today is dominated by defensive techniques. However, recently, offensive techniques which were originally developed hackers, are gaining widespread approval. Many information educators believe that teaching methods yields better professionals than alone. In addition, every course in IT should be accompanied a basic discussion legal implications and ethics.
A novel approach is presented to improve firewall packet filtering through optimising the order of rules for early acceptance as well rule-fields rejection. The proposed based on calculation histograms matching and not rule-fields. These are able effectively monitor performance in real-time predict patterns terms order. Furthermore, becomes even more significant when heavily loaded with burst traffic. comparison other conventional approaches, including static rule dynamic presented....
An international association advancing the multidisciplinary study of informing systems. Founded in 1998, Informing Science Institute (ISI) is a global community academics shaping future science.