Nebrase Elmrabit

ORCID: 0000-0002-4267-8798
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Spam and Phishing Detection
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Cybercrime and Law Enforcement Studies
  • Smart Grid Security and Resilience
  • IoT-based Smart Home Systems
  • Microbial Inactivation Methods
  • Quantum many-body systems
  • Energy Harvesting in Wireless Networks
  • Chaos-based Image/Signal Encryption
  • Web Application Security Vulnerabilities
  • Wireless Power Transfer Systems
  • Advanced Malware Detection Techniques
  • Ethics in Business and Education
  • Privacy-Preserving Technologies in Data

Glasgow Caledonian University
2020-2025

University of Leicester
2020

Loughborough University
2015

Malicious attack detection is one of the critical cyber-security challenges in peer-to-peer smart grid platforms due to fact that attackers' behaviours change continuously over time. In this paper, we evaluate twelve Machine Learning (ML) algorithms terms their ability detect anomalous networking practice. The evaluation performed on three publicly available datasets: CICIDS-2017, UNSW-NB15 and Industrial Control System (ICS) cyber-attack datasets. experimental work through ALICE...

10.1109/cybersecurity49315.2020.9138871 article EN 2020-06-01

This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum distribution (QKD). Modern faces significant threats from computers, which can solve classical problems rapidly. PQC address critical security challenges QKD, particularly authentication and encryption, ensure reliable communication across channels. The other objective this study is balance speed among various algorithms different levels,...

10.3390/computers13070163 article EN cc-by Computers 2024-07-01

The main concern of most security experts in the last years is need to mitigate insider threats. However, leaking and selling data these days easier than before; with use invisible web, insiders can leak confidential while remaining anonymous. In this paper, we give an overview various basic characteristics We also consider current approaches controls mitigating level such threats by broadly classifying them into two categories.

10.1109/iconac.2015.7313979 article EN 2015-09-01

Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation many scanning techniques is their susceptibility producing false positives. This paper presents novel framework designed automate operation Web Application Vulnerability Scanners (WAVS) within single platform. The generates combined vulnerabilities report using two algorithms: an automation algorithm and combination that produces...

10.3390/computers12110235 article EN cc-by Computers 2023-11-15

Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, problem how to ensure security data transmission storage in CPSS is key issue address. We need protect confidentiality privacy users' identity during process CPSS. In order avoid personal information leakage from IoT devices processing transmitting, we propose certificateless encryption scheme, conduct analysis under assumption Computational...

10.1109/access.2020.2982961 article EN cc-by IEEE Access 2020-01-01
Coming Soon ...