- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Data Mining Algorithms and Applications
- Distributed and Parallel Computing Systems
- Data Management and Algorithms
- Peer-to-Peer Network Technologies
- Digital Media Forensic Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Clustering Algorithms Research
- Parallel Computing and Optimization Techniques
- Privacy-Preserving Technologies in Data
- Smart Agriculture and AI
- Cloud Computing and Resource Management
- User Authentication and Security Systems
- Network Security and Intrusion Detection
- Customer churn and segmentation
- Cloud Data Security Solutions
- Advanced Data Storage Technologies
- Handwritten Text Recognition Techniques
- Scientific Computing and Data Management
- Complex Network Analysis Techniques
- Data Quality and Management
- Caching and Content Delivery
- Advanced Database Systems and Queries
- Crime, Illicit Activities, and Governance
University College Dublin
2016-2025
Dublin City University
2023-2024
Beijing Institute of Technology
2024
University of Ulster
2022-2024
University of Laghouat
2024
University of Science and Technology Beijing
2022-2024
University of Cagliari
2022
University Ferhat Abbas of Setif
2022
Institut National Polytechnique de Toulouse
2015-2020
University Child Development School
2020
This paper presents the first version of a Wireless Sensor Network simulator, called CupCarbon. It is multiagent and discrete event (WSN) simulator. Networks can be designed prototyped in an ergonomic user-friendly interface using OpenStreetMap (OSM) framework by de
6G wireless networks improve on 5G by further increasing reliability, speeding up the and available bandwidth. These evolutionary enhancements, together with a number of revolutionary improvements such as high-precision 3D localization, ultra-high reliability extreme mobility, introduce new generation 6G-native applications. Such application can be based on, for example, distributed, ubiquitous Artificial Intelligence (AI) ultra-reliable, low-latency Internet Things (IoT). Along enhanced...
A trust management system (TMS) is an integral component of any Internet Things (IoT) network. reliable TMS must guarantee the network security, data integrity, and act as a referee that promotes legitimate devices, punishes malicious activities. Trust scores assigned by TMSs reflect devices' reputations, which can help predict future behaviors entities subsequently judge reliability different in IoT networks. Many have been proposed literature, these systems are designed for small-scale...
Vehicular social networking is an emerging application of the Internet Vehicles (IoV) which aims to achieve seamless integration vehicular networks and networks. However, unique characteristics networks, such as high mobility frequent communication interruptions, make content delivery end-users under strict delay constraints extremely challenging. In this paper, we propose a social-aware edge computing architecture that solves problem by using some vehicles in network servers can store...
Metaverse is a virtual environment where users are represented by their avatars to navigate world having strong links with its physical counterpart. The state-of-the-art architectures rely on cloud-based approach for avatar physics emulation and graphics rendering computation. current centralized architecture of such systems unfavorable as it suffers from several drawbacks caused the long latency cloud access, low-quality visualization. To this end, we propose Fog-Edge hybrid computing...
Data Warehouse (DW) is a common term used in the Mining process for storing copious amounts of data ready analysis. Organizations are starting to prioritize Warehouses, which essential mining their historical datasets. In healthcare industry, significance warehouses escalates due critical nature managing and processing medical data, plays crucial role facilitating optimal delivery generation valuable insights. While clinical complex, its timely integration analysis providing excellent...
The Metaverse is a virtual environment where users are represented by avatars to navigate world, which has strong links with the physical one. State-of-the-art architectures rely on cloud-based approach for avatar physics emulation and graphics rendering computation. Such centralized design unfavorable as it suffers from several drawbacks caused long latency required cloud access, such low quality visualization. To solve this issue, in paper, we propose Fog-Edge hybrid computing architecture...
Abstract Recent advances in Information and Communication Technologies have a significant impact on all sectors of the economy worldwide. Digital Agriculture appeared as consequence democratisation digital devices artificial intelligence data science. agriculture created new processes for making farming more productive efficient while respecting environment. sophisticated science allowed collection analysis vast amounts agricultural datasets to help farmers, agronomists, professionals...
Recently, money laundering is becoming more and sophisticated, it seems to have moved from the personal gain cliché of drug trafficking financing terrorism. This criminal activity poses a serious threat not only financial institutions but also nation. Today, most international been implementing anti-money solutions traditional investigative techniques consume numerous man-hours. Besides, existing commercial are based on statistics such as means standard deviations therefore efficient enough,...
Having a clear view of events that occurred over time is difficult objective to achieve in digital investigations (DI). Event reconstruction, which allows investigators understand the timeline crime, one most important step DI process. This complex task requires exploration large amount due pervasiveness new technologies nowadays. Any evidence produced at end investigative process must also meet requirements courts, such as reproducibility, verifiability, validation, etc. For this purpose,...
Band selection (dimensionality reduction) plays an essential role in hyper-spectral image processing and applications. This article presents a unified comparison framework for systematic performance of filter-based feature models conducts comparative evaluation four methods: maximal minimal associated index (MMAIQ), mutual information-based max-dependency criterion (mRMR), relief (Relief-F), correlation-based (CFS) band selection. The is based on the effectiveness, robustness, classification...