Mahmoud Abdel-Salam

ORCID: 0000-0002-9714-0717
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Metaheuristic Optimization Algorithms Research
  • Evolutionary Algorithms and Applications
  • Network Security and Intrusion Detection
  • Advanced Multi-Objective Optimization Algorithms
  • Artificial Immune Systems Applications
  • Advanced Algorithms and Applications
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • IoT-based Smart Home Systems
  • Advanced Image and Video Retrieval Techniques
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Machine Learning and Data Classification
  • Internet Traffic Analysis and Secure E-voting
  • Service-Oriented Architecture and Web Services
  • Photovoltaic System Optimization Techniques
  • Silicon and Solar Cell Technologies
  • Face and Expression Recognition
  • Brain Tumor Detection and Classification
  • Hybrid Renewable Energy Systems
  • Smart Grid Security and Resilience
  • Video Surveillance and Tracking Methods
  • Food Waste Reduction and Sustainability
  • Energy and Environment Impacts
  • Machine Learning and ELM

Mansoura University
2019-2025

Internet of Things (IoT) is one the most important emerging technologies that supports Metaverse integrating process, by enabling smooth data transfer among physical and virtual domains. Integrating sensor devices, wearables, smart gadgets into environment enables IoT to deepen interactions enhance immersion, both crucial for a completely integrated, data-driven Metaverse. Nevertheless, because devices are often built with minimal hardware connected Internet, they highly susceptible...

10.1038/s41598-025-88135-9 article EN cc-by-nc-nd Scientific Reports 2025-01-28

Due to the growing number of Internet Things (IoT) devices, network attacks like denial service (DoS) and floods are rising for security reliability issues. As a result these attacks, IoT devices suffer from disruption. Researchers have implemented different techniques identify aimed at vulnerable devices. In this study, we propose novel features selection algorithm FGOA-kNN based on hybrid filter wrapper approaches select most relevant features. The approach integrated with clustering rank...

10.1109/access.2023.3253432 article EN cc-by-nc-nd IEEE Access 2023-01-01

Abstract Accurately predicting crop yield is essential for optimizing agricultural practices and ensuring food security. However, existing approaches often struggle to capture the complex interactions between various environmental factors growth, leading suboptimal predictions. Consequently, identifying most important feature vital when leveraging Support Vector Regressor (SVR) prediction. In addition, manual tuning of SVR hyperparameters may not always offer high accuracy. this paper, we...

10.1007/s00521-024-10226-x article EN cc-by Neural Computing and Applications 2024-08-16

Intrusion Detection is crucial in contemporary cybersecurity landscapes to proactively thwart and identify possible threats. The risk of data breaches, malicious activities, unauthorized access escalates as organizations increasingly rely on interconnected systems. Systems (IDS) are imperative for the continuous monitoring system network quickly identifying patterns or anomalies indicative cyber IDS acts a frontline defense mechanism with ability abnormal behaviors known attack signatures....

10.54216/ijns.240415 article EN International Journal of Neutrosophic Science 2024-01-01

10.5013/ijssst.a.20.03.16 article EN International Journal of Simulation Systems Science & Technology 2019-06-28
Coming Soon ...