Skip to main content

Research Repository

Advanced Search

All Outputs (12)

Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer (2024)
Journal Article

In the security domain, the growing need for reliable authentication methods highlights the importance of
thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications.
Challenges like computational r... Read More about Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer.

FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning (2024)
Presentation / Conference Contribution

In the realm of smart water utilities, the increasing sophistication of cyber threats presents a significant challenge to the security and operational integrity of water and wastewater treatment facilities. These facilities, heavily dependent on Indu... Read More about FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning.

ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques (2024)
Journal Article
Eltoukhy, M. M., Gaber, T., Almazroi, A. A., & Mohamed, M. F. (in press). ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Computer Science, 10, e2001. https://doi.org/10.7717/peerj-cs.2001

This study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explore... Read More about ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques.

FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network (2024)
Journal Article
Ali Almazroi, A., A. Alqarni, M., A. Al-Shareeda, M., H. Alkinani, M., Atallah Almazroey, A., & Gaber, T. (2024). FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet of Things, 25, https://doi.org/10.1016/j.iot.2024.101096

Emerging technology known as intelligent transportation systems allows for seamless two-way communication between moving vehicles and stationary infrastructure. Therefore, core security services in a vehicular network consist of encrypting and trusti... Read More about FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network.

Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection (2024)
Thesis

Phishing is a significant threat to the modern world, causing considerable financial losses. Although electronic mail has shown to be a valuable asset around the world in terms of facilitating communication for all parties involved, whether huge corp... Read More about Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection.