Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Engineering Applications of Artificial Intelligence A novel triplet loss architecture with visual explanation for detecting the unwanted rotation of bolts in safety-critical environments (2025)
Journal Article

In the commonly used method of bolting to secure parts of equipment and structure, the bolts must be tightened to an adequate preload force. Failure to do so could affect the integrity of the structure, as well as the efficient running of the site an... Read More about Engineering Applications of Artificial Intelligence A novel triplet loss architecture with visual explanation for detecting the unwanted rotation of bolts in safety-critical environments.

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks (2025)
Journal Article

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to... Read More about An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.

A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats (2025)
Journal Article
Kotb, H. M., Gaber, T., AlJanah, S., Zawbaa, H. M., & Alkhathami, M. (2025). A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats. Scientific Reports, 15, Article 207. https://doi.org/10.1038/s41598-024-84673-w

Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. Traditional intrusion detection systems struggle to... Read More about A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats.