Skip to main content

Research Repository

Advanced Search

All Outputs (76)

Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory (2023)
Journal Article
Ardo, A. A., A. Ardo, A. A., Bass, J. M., & Gaber, T. (2023). Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory. The Electronic Journal of Information Systems in Developing Countries, 89(6), https://doi.org/10.1002/isd2.12285

Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered security features during the development process. Agile methods ha... Read More about Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory.

Comparing Object Recognition Models and Studying Hyperparameter Selection for the Detection of Bolts (2023)
Presentation / Conference Contribution

The commonly-used method of bolting, used to secure parts of apparatus together, relies on the bolts having a sufficient preload force in order to the ensure mechanical strength. Failing to secure bolted connections to a suitable torque rating can ha... Read More about Comparing Object Recognition Models and Studying Hyperparameter Selection for the Detection of Bolts.

Deep churn prediction method for telecommunication industry (2023)
Journal Article
Saha, L., Tripathy, H., Gaber, T., El-Gohary, H., & El-kenawy, E. (2023). Deep churn prediction method for telecommunication industry. Sustainability, 15(5), 4543

Being able to predict the churn rate is the key to success for the telecommunication industry. It is also important for the telecommunication industry to obtain a high profit. Thus, the challenge is to predict the churn percentage of customers with h... Read More about Deep churn prediction method for telecommunication industry.

Optimized and efficient image-based IoT malware detection method (2023)
Journal Article
El-Ghamry, A., Gaber, T., Mohammed, K., & Hassanien, A. (2023). Optimized and efficient image-based IoT malware detection method. Electronics, 12(3), 708. https://doi.org/10.3390/electronics12030708

With the widespread use of IoT applications, malware has become a difficult and sophisticated threat. Without robust security measures, a massive volume of confidential and classified data could be exposed to vulnerabilities through which hackers cou... Read More about Optimized and efficient image-based IoT malware detection method.

KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme (2023)
Journal Article
Mukherjee, P., Pradhan, C., Tripathy, H., & Gaber, T. (2023). KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme. Electronics, 12(3), 493. https://doi.org/10.3390/electronics12030493

Today’s digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose of this paper is to conglomerate the fundamentals of Blockchain, AI (Artificial Intelligence) and DNA (Deoxyribonuc... Read More about KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme.

EJISDC Paper 2022 - Appendix (2022)
Data

This document contains the initial and reviewed interview guides used for this study data collection. The document also contains the table describing the attributes of participants and their organizations.

Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey (2022)
Journal Article
Mkaouer, M., Gaber, T., & Dagdia, Z. (2022). Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey. Applied Computational Intelligence and Soft Computing, 2(2), 173-194. https://doi.org/10.3934/aci.2022010

In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced gov... Read More about Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey.

A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms (2022)
Journal Article
A. Mohamed, E., Gaber, T., Karam, O., & Rashed, E. A. (2022). A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms. PLoS ONE, 17(10), https://doi.org/10.1371/journal.pone.0276523

Breast cancer is the second most frequent cancer worldwide, following lung cancer and the fifth leading cause of cancer death and a major cause of cancer death among women. In recent years, convolutional neural networks (CNNs) have been successfully... Read More about A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms.

A novel drone-station matching model in smart cities based on strict preferences (2022)
Journal Article
Nath, D., Bandyopadhyay, A., Rana, A., Gaber, T., & Hassanien, A. (2022). A novel drone-station matching model in smart cities based on strict preferences. Unmanned Systems, 1-11. https://doi.org/10.1142/s2301385023500115

There has been a considerable increase in the use of drones, or unmanned aerial vehicles (UAVs), in recent times, for a wide variety of purposes such as security, surveillance, delivery, search and rescue operations, penetration of inaccessible or un... Read More about A novel drone-station matching model in smart cities based on strict preferences.

A Blockchain Protocol for Authenticating Space Communications between Satellites Constellations (2022)
Journal Article
Torky, M., Gaber, T., Goda, E., Snasel, V., & Hassanien, A. E. (2022). A Blockchain Protocol for Authenticating Space Communications between Satellites Constellations. Aerospace, 9(9), 495. https://doi.org/10.3390/aerospace9090495

Blockchain has found many applications, apart from Bitcoin, in different fields and it has the potential to be very useful in the satellite communications and space industries. Decentralized and secure protocols for processing and manipulating space... Read More about A Blockchain Protocol for Authenticating Space Communications between Satellites Constellations.

Prioritized and predictive intelligence of things enabled waste management model in smart and sustainable environment (2022)
Journal Article

Collaborative modelling of the Internet of Things (IoT) with Artificial Intelligence (AI) has merged into the Intelligence of Things concept. This recent trend enables sensors to track required parameters and store accumulated data in cloud storage,... Read More about Prioritized and predictive intelligence of things enabled waste management model in smart and sustainable environment.

A systematic literature review on phishing email detection using natural language processing techniques (2022)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2022). A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access, 10, 65703-65727. https://doi.org/10.1109/access.2022.3183083

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about A systematic literature review on phishing email detection using natural language processing techniques.

Euromicro SEAA 2022 - APPENDIX.pdf (2022)
Data

The document contains interview guide use for this research as well as the model validation focus group questions. Also, Table supporting the inclusion of each element on the model as well as the details of the research participants are presented.

Injection attack detection using machine learning for smart IoT applications (2022)
Journal Article
Gaber, T., El-Ghamry, A., & Hassanien, A. (2022). Injection attack detection using machine learning for smart IoT applications. Physical Communication, 52, https://doi.org/10.1016/j.phycom.2022.101685

Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless sensors to connect their different components (smart devices) together. Smart cities rely on the integration of IoT and 5G technologies, and this has creat... Read More about Injection attack detection using machine learning for smart IoT applications.

Automatic Face Mask Detection System in Public Transportation in Smart Cities Using IoT and Deep Learning (2022)
Journal Article
Kumar, T. A., Rajmohan, R., Pavithra, M., Ajagbe, S. A., Hodhod, R., & Gaber, T. (2022). Automatic Face Mask Detection System in Public Transportation in Smart Cities Using IoT and Deep Learning. Electronics, 11(6), 904. https://doi.org/10.3390/electronics11060904

The World Health Organization (WHO) has stated that the spread of the coronavirus (COVID-19) is on a global scale and that wearing a face mask at work is the only effective way to avoid becoming infected with the virus. The pandemic made governments... Read More about Automatic Face Mask Detection System in Public Transportation in Smart Cities Using IoT and Deep Learning.