Skip to main content

Research Repository

Advanced Search

All Outputs (76)

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks (2025)
Journal Article

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to... Read More about An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.

A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats (2025)
Journal Article
Kotb, H. M., Gaber, T., AlJanah, S., Zawbaa, H. M., & Alkhathami, M. (2025). A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats. Scientific Reports, 15, Article 207. https://doi.org/10.1038/s41598-024-84673-w

Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. Traditional intrusion detection systems struggle to... Read More about A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats.

Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer (2024)
Journal Article

In the security domain, the growing need for reliable authentication methods highlights the importance of
thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications.
Challenges like computational r... Read More about Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer.

FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning (2024)
Presentation / Conference Contribution

In the realm of smart water utilities, the increasing sophistication of cyber threats presents a significant challenge to the security and operational integrity of water and wastewater treatment facilities. These facilities, heavily dependent on Indu... Read More about FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning.

ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques (2024)
Journal Article
Eltoukhy, M. M., Gaber, T., Almazroi, A. A., & Mohamed, M. F. (in press). ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Computer Science, 10, e2001. https://doi.org/10.7717/peerj-cs.2001

This study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explore... Read More about ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques.

FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network (2024)
Journal Article
Ali Almazroi, A., A. Alqarni, M., A. Al-Shareeda, M., H. Alkinani, M., Atallah Almazroey, A., & Gaber, T. (2024). FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet of Things, 25, https://doi.org/10.1016/j.iot.2024.101096

Emerging technology known as intelligent transportation systems allows for seamless two-way communication between moving vehicles and stationary infrastructure. Therefore, core security services in a vehicular network consist of encrypting and trusti... Read More about FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network.

Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection (2024)
Thesis

Phishing is a significant threat to the modern world, causing considerable financial losses. Although electronic mail has shown to be a valuable asset around the world in terms of facilitating communication for all parties involved, whether huge corp... Read More about Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection.

Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks (2023)
Journal Article
Gaber, T., Awotunde, J. B., Torky, M., Ajagbe, S. A., Hammoudeh, M., & Li, W. (2023). Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Internet of Things, 24, 100977. https://doi.org/10.1016/j.iot.2023.100977

Combining the metaverse and the Internet of Things (IoT) will lead to the development of diverse, virtual, and more advanced networks in the future. The integration of IoT networks with the metaverse will enable more meaningful connections between th... Read More about Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks.

A novel CNN gap layer for growth prediction of palm tree plantlings (2023)
Journal Article
Kumar, T. A., Rajmohan, R., Adeola Ajagbe, S., Gaber, T., Zeng, X.-J., & Masmoudi, F. (in press). A novel CNN gap layer for growth prediction of palm tree plantlings. PloS one, 18(8), e0289963. https://doi.org/10.1371/journal.pone.0289963

Monitoring palm tree seedlings and plantlings presents a formidable challenge because of the microscopic size of these organisms and the absence of distinguishing morphological characteristics. There is a demand for technical approaches that can prov... Read More about A novel CNN gap layer for growth prediction of palm tree plantlings.

An improved long short term memory network for intrusion detection (2023)
Journal Article
Awad, A. A., Ali, A. F., & Gaber, T. (in press). An improved long short term memory network for intrusion detection. PloS one, 18(8), e0284795. https://doi.org/10.1371/journal.pone.0284795

Over the years, intrusion detection system has played a crucial role in network security by discovering attacks from network traffics and generating an alarm signal to be sent to the security team. Machine learning methods, e.g., Support Vector Machi... Read More about An improved long short term memory network for intrusion detection.

Efficient thermal face recognition method using optimized curvelet features for biometric authentication (2023)
Journal Article
Ali, M. A. S., Meselhy Eltoukhy, M., Rajeena P. P., F., & Gaber, T. (in press). Efficient thermal face recognition method using optimized curvelet features for biometric authentication. PloS one, 18(6), e0287349. https://doi.org/10.1371/journal.pone.0287349

Biometric technology is becoming increasingly prevalent in several vital applications that substitute traditional password and token authentication mechanisms. Recognition accuracy and computational cost are two important aspects that are to be consi... Read More about Efficient thermal face recognition method using optimized curvelet features for biometric authentication.