Skip to main content

Research Repository

Advanced Search

All Outputs (62)

A blockchain protocol for authenticating space communications between satellites constellations (2022)
Journal Article
Torky, M., Gaber, T., Goda, E., Snasel, V., & Hassanien, A. (2022). A blockchain protocol for authenticating space communications between satellites constellations. Aerospace, 9(9), https://doi.org/10.3390/aerospace9090495

Blockchain has found many applications, apart from Bitcoin, in different fields and it has the potential to be very useful in the satellite communications and space industries. Decentralized and secure protocols for processing and manipulating space... Read More about A blockchain protocol for authenticating space communications between satellites constellations.

Prioritized and predictive intelligence of things enabled waste management model in smart and sustainable environment (2022)
Journal Article
Mishra, S., Jena, L., Tripathy, H., & Gaber, T. (2022). Prioritized and predictive intelligence of things enabled waste management model in smart and sustainable environment. PLoS ONE, 17(8), https://doi.org/10.1371/journal.pone.0272383

Collaborative modelling of the Internet of Things (IoT) with Artificial Intelligence (AI) has merged into the Intelligence of Things concept. This recent trend enables sensors to track required parameters and store accumulated data in cloud storage,... Read More about Prioritized and predictive intelligence of things enabled waste management model in smart and sustainable environment.

A systematic literature review on phishing email detection using natural language processing techniques (2022)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2022). A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access, 10, 65703-65727. https://doi.org/10.1109/access.2022.3183083

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about A systematic literature review on phishing email detection using natural language processing techniques.

Injection attack detection using machine learning for smart IoT applications (2022)
Journal Article
Gaber, T., El-Ghamry, A., & Hassanien, A. (2022). Injection attack detection using machine learning for smart IoT applications. Physical Communication, 52, https://doi.org/10.1016/j.phycom.2022.101685

Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless sensors to connect their different components (smart devices) together. Smart cities rely on the integration of IoT and 5G technologies, and this has creat... Read More about Injection attack detection using machine learning for smart IoT applications.

Automatic face mask detection system in public transportation in smart cities using IoT and deep learning (2022)
Journal Article
Kumar, T., Rajmohan, R., Pavithra, M., Ajagbe, S., Hodhod, R., & Gaber, T. (2022). Automatic face mask detection system in public transportation in smart cities using IoT and deep learning. Electronics, 11(6), 904. https://doi.org/10.3390/electronics11060904

The World Health Organization (WHO) has stated that the spread of the coronavirus (COVID-19) is on a global scale and that wearing a face mask at work is the only effective way to avoid becoming infected with the virus. The pandemic made governments... Read More about Automatic face mask detection system in public transportation in smart cities using IoT and deep learning.

An empirical investigation of agile information systems development for cybersecurity (2022)
Journal Article
Ardo, A., Bass, J., & Gaber, T. (2022). An empirical investigation of agile information systems development for cybersecurity. Lecture notes in business information processing (Internet), 567-581. https://doi.org/10.1007/978-3-030-95947-0_40

Cybersecurity has been identified as a major challenge confronting the digital world, neglecting cybersecurity techniques during software design and development increases the risk of malicious attacks. Thus, there is a need to make security an inte... Read More about An empirical investigation of agile information systems development for cybersecurity.

Towards secure agile software development process: a practice-based model (2022)
Conference Proceeding
Ardo, A., Bass, J., & Gaber, T. (2022). Towards secure agile software development process: a practice-based model. In 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). https://doi.org/10.1109/SEAA56994.2022.00031

Agile methods are a well-established paradigm in the software development field. Agile adoption has contributed to improving software quality. However, software products are vulnerable to security challenges and susceptible to cyberattacks. This stud... Read More about Towards secure agile software development process: a practice-based model.

Deep learning model for fully automated breast cancer detection system from thermograms (2022)
Journal Article
Mohamed, E., Rashed, E., Gaber, T., & Karam, O. (2022). Deep learning model for fully automated breast cancer detection system from thermograms. PLoS ONE, 17(1), e0262349. https://doi.org/10.1371/journal.pone.0262349

Breast cancer is one of the most common diseases among women worldwide. It is considered one of the leading causes of death among women. Therefore, early detection is necessary to save lives. Thermography imaging is an effective diagnostic technique... Read More about Deep learning model for fully automated breast cancer detection system from thermograms.

Phishing website detection from URLs using classical machine learning ANN model (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing website detection from URLs using classical machine learning ANN model. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Internet), 2, 509-523. https://doi.org/10.1007/978-3-030-90022-9_28

Phishing is a serious form of online fraud made up of spoofed websites that attempt to gain users’ sensitive information by tricking them into believing that they are visiting a legitimate site. Phishing attacks can be detected many ways, including a... Read More about Phishing website detection from URLs using classical machine learning ANN model.

Phishing email detection using Natural Language Processing techniques : a literature survey (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing email detection using Natural Language Processing techniques : a literature survey. Procedia Computer Science, 189, 19-28. https://doi.org/10.1016/j.procs.2021.05.077

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about Phishing email detection using Natural Language Processing techniques : a literature survey.

Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges (2021)
Journal Article
Gaber, T., El Jazouli, Y., Eldesouky, E., & Ali, A. (2021). Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges. Electronics, 10(11), e1357. https://doi.org/10.3390/electronics10111357

The current advancement of robotics, especially in Cyber-Physical Systems (CPS), leads to a prominent combination between the mining industry and connected-embedded technologies. This progress has arisen in the form of state-of-the-art automated gian... Read More about Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges.

Acceptance of Google Meet during the spread of Coronavirus by Arab university students (2021)
Journal Article
Al-Maroof, R., Alshurideh, M., Salloum, S., AlHamad, A., & Gaber, T. (2021). Acceptance of Google Meet during the spread of Coronavirus by Arab university students. Informatics, 8(2), e24. https://doi.org/10.3390/informatics8020024

The COVID-19 pandemic not only affected our health and medical systems but also has created large disruption of education systems at school and universities levels. According to the United Nation’s report, COVID-19 has influenced more than 1.6 billio... Read More about Acceptance of Google Meet during the spread of Coronavirus by Arab university students.

A grey wolf-based method for mammographic mass classification (2020)
Journal Article
Tahoun, M., Almazroi, A., Alqarni, M., Gaber, T., Mahmoud, E., & Eltoukhy, M. (2020). A grey wolf-based method for mammographic mass classification. Applied Sciences, 10(23), e8422. https://doi.org/10.3390/app10238422

Breast cancer is one of the most prevalent cancer types with a high mortality rate in women worldwide. This devastating cancer still represents a worldwide public health concern in terms of high morbidity and mortality rates. The diagnosis of breast... Read More about A grey wolf-based method for mammographic mass classification.

Implicit authentication method for smartphone users based on rank aggregation and random forest (2020)
Journal Article
rank aggregation and random forest. Alexandria engineering journal : AEJ, 60(1), 273-283. https://doi.org/10.1016/j.aej.2020.08.006

Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’ users run various essential applications (such as banking and e-health Apps), which contains very confidential information (e.g., credit card number... Read More about Implicit authentication method for smartphone users based on rank aggregation and random forest.

thermogram Breast Cancer Detection : a comparative study of two machine learning techniques (2020)
Journal Article
AlFayez, F., El-Soud, M., & Gaber, T. (2020). thermogram Breast Cancer Detection : a comparative study of two machine learning techniques. Applied Sciences, 10(2), e551. https://doi.org/10.3390/app10020551

Breast cancer is considered one of the major threats for women’s health all over the world. The World Health Organization (WHO) has reported that 1 in every 12 women could be subject to a breast abnormality during her lifetime. To increase survival r... Read More about thermogram Breast Cancer Detection : a comparative study of two machine learning techniques.

Trust-based secure clustering in WSN-based intelligent transportation systems (2018)
Journal Article
transportation systems. Computer Networks, 146, 151-158. https://doi.org/10.1016/j.comnet.2018.09.015

Increasing the number of vehicles on roads leads to congestion and safety problems. Wireless Sensor Network (WSN) is a promising technology providing Intelligent Transportation Systems (ITS) to address these problems. Usually, WSN-based applications,... Read More about Trust-based secure clustering in WSN-based intelligent transportation systems.

Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier (2018)
Journal Article
Tharwat, A., Gaber, T., Hassanien, A., & Elhoseny, M. (2018). Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. Computers and Electrical Engineering, 71, 346-358. https://doi.org/10.1016/j.compeleceng.2018.07.049

Measuring toxicity is one of the most important steps to develop a new drug. During the drug development, animals are widely used to investigate the toxic effects by exposing them to the toxicants. Zebrafish embryo is one of the most suitable animals... Read More about Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier.

Optimized superpixel and AdaBoost classifier for human thermal face recognition (2017)
Journal Article
Ibrahim, A., Tharwat, A., & Gaber, T. (2018). Optimized superpixel and AdaBoost classifier for human thermal face recognition. Signal, Image and Video Processing, 12(4), 711-719. https://doi.org/10.1007/s11760-017-1212-6

Infrared spectrum-based human recognition systems offer straightforward and robust solutions for achieving an excellent performance in uncontrolled illumination. In this paper, a human thermal face recognition model is proposed. The model consists of... Read More about Optimized superpixel and AdaBoost classifier for human thermal face recognition.

Proceedings of the international conference on advanced intelligent systems and informatics 2017 (2017)
Book
Gaber, T., Hassanien, A., Shaalan, K., & Tolba, M. (2017). Proceedings of the international conference on advanced intelligent systems and informatics 2017. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3

This book gathers the proceedings of the 3rd International Conference on Advanced Intelligent Systems and Informatics 2017 (AISI2017), which took place in Cairo, Egypt from September 9 to 11, 2017. This international and interdisciplinary conference,... Read More about Proceedings of the international conference on advanced intelligent systems and informatics 2017.