Skip to main content

Research Repository

Advanced Search

All Outputs (61)

A Novel Practice-Based Process Model for Secure Agile Software Development (2024)
Thesis
Ardo, A. (2024). A Novel Practice-Based Process Model for Secure Agile Software Development. (Thesis). University of Salford

Nigeria is ranked second globally after India in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have considered security features during the development process. Agile methodologies are a well... Read More about A Novel Practice-Based Process Model for Secure Agile Software Development.

Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection (2024)
Thesis
Salloum, S. (2024). Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection. (Thesis). University of Salford

Phishing is a significant threat to the modern world, causing considerable financial losses. Although electronic mail has shown to be a valuable asset around the world in terms of facilitating communication for all parties involved, whether huge corp... Read More about Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection.

Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks (2023)
Journal Article
Gaber, T., Awotunde, J. B., Torky, M., Ajagbe, S. A., Hammoudeh, M., & Li, W. (2023). Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Internet of Things, 24, 100977. https://doi.org/10.1016/j.iot.2023.100977

Combining the metaverse and the Internet of Things (IoT) will lead to the development of diverse, virtual, and more advanced networks in the future. The integration of IoT networks with the metaverse will enable more meaningful connections between th... Read More about Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks.

A novel CNN gap layer for growth prediction of palm tree plantlings (2023)
Journal Article
Kumar, T. A., Rajmohan, R., Adeola Ajagbe, S., Gaber, T., Zeng, X., & Masmoudi, F. (in press). A novel CNN gap layer for growth prediction of palm tree plantlings. PloS one, 18(8), e0289963. https://doi.org/10.1371/journal.pone.0289963

Monitoring palm tree seedlings and plantlings presents a formidable challenge because of the microscopic size of these organisms and the absence of distinguishing morphological characteristics. There is a demand for technical approaches that can prov... Read More about A novel CNN gap layer for growth prediction of palm tree plantlings.

An improved long short term memory network for intrusion detection (2023)
Journal Article
Awad, A. A., Ali, A. F., & Gaber, T. (in press). An improved long short term memory network for intrusion detection. PloS one, 18(8), e0284795. https://doi.org/10.1371/journal.pone.0284795

Over the years, intrusion detection system has played a crucial role in network security by discovering attacks from network traffics and generating an alarm signal to be sent to the security team. Machine learning methods, e.g., Support Vector Machi... Read More about An improved long short term memory network for intrusion detection.

A New English/Arabic Parallel Corpus for Phishing Emails (2023)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (in press). A New English/Arabic Parallel Corpus for Phishing Emails. #Journal not on list, https://doi.org/10.1145/3606031

Phishing involves malicious activity whereby phishers, in the disguise of legitimate entities, obtain illegitimate access to the victims’ personal and private information, usually through emails. Currently, phishing attacks and threats are being hand... Read More about A New English/Arabic Parallel Corpus for Phishing Emails.

Efficient thermal face recognition method using optimized curvelet features for biometric authentication (2023)
Journal Article
Ali, M. A. S., Meselhy Eltoukhy, M., Rajeena P. P., F., & Gaber, T. (in press). Efficient thermal face recognition method using optimized curvelet features for biometric authentication. PloS one, 18(6), e0287349. https://doi.org/10.1371/journal.pone.0287349

Biometric technology is becoming increasingly prevalent in several vital applications that substitute traditional password and token authentication mechanisms. Recognition accuracy and computational cost are two important aspects that are to be consi... Read More about Efficient thermal face recognition method using optimized curvelet features for biometric authentication.

Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory (2023)
Journal Article
Ardo, A. A., A. Ardo, A. A., Bass, J. M., & Gaber, T. (2023). Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory. The Electronic Journal of Information Systems in Developing Countries, 89(6), https://doi.org/10.1002/isd2.12285

Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered security features during the development process. Agile methods ha... Read More about Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory.

Comparing Object Recognition Models and Studying Hyperparameter Selection for the Detection of Bolts (2023)
Conference Proceeding
Bolton, T., Bass, J., Gaber, T., & Mansouri, T. (2023). Comparing Object Recognition Models and Studying Hyperparameter Selection for the Detection of Bolts. In Natural Language Processing and Information Systems (186-200). https://doi.org/10.1007/978-3-031-35320-8_13

The commonly-used method of bolting, used to secure parts of apparatus together, relies on the bolts having a sufficient preload force in order to the ensure mechanical strength. Failing to secure bolted connections to a suitable torque rating can ha... Read More about Comparing Object Recognition Models and Studying Hyperparameter Selection for the Detection of Bolts.

A Data Brokering Architecture to Guarantee Nonfunctional Requirements in IoT Applications (2023)
Conference Proceeding
Mansouri, T., Bass, J., Gaber, T., Wright, S., & Scorey, B. (2023). A Data Brokering Architecture to Guarantee Nonfunctional Requirements in IoT Applications. In Big Data Technologies and Applications (75-84). https://doi.org/10.1007/978-3-031-33614-0_6

IoT sensors capture different aspects of the environmental data and generate high throughput data streams. To harvest potential values from these sensors, a system fulfilling the big data requirements should be designed. In this work, we reviewed the... Read More about A Data Brokering Architecture to Guarantee Nonfunctional Requirements in IoT Applications.

Deep churn prediction method for telecommunication industry (2023)
Journal Article
Saha, L., Tripathy, H., Gaber, T., El-Gohary, H., & El-kenawy, E. (2023). Deep churn prediction method for telecommunication industry. Sustainability, 15(5), 4543

Being able to predict the churn rate is the key to success for the telecommunication industry. It is also important for the telecommunication industry to obtain a high profit. Thus, the challenge is to predict the churn percentage of customers with h... Read More about Deep churn prediction method for telecommunication industry.

Optimized and efficient image-based IoT malware detection method (2023)
Journal Article
El-Ghamry, A., Gaber, T., Mohammed, K., & Hassanien, A. (2023). Optimized and efficient image-based IoT malware detection method. Electronics, 12(3), 708. https://doi.org/10.3390/electronics12030708

With the widespread use of IoT applications, malware has become a difficult and sophisticated threat. Without robust security measures, a massive volume of confidential and classified data could be exposed to vulnerabilities through which hackers cou... Read More about Optimized and efficient image-based IoT malware detection method.

KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme (2023)
Journal Article
Mukherjee, P., Pradhan, C., Tripathy, H., & Gaber, T. (2023). KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme. Electronics, 12(3), 493. https://doi.org/10.3390/electronics12030493

Today’s digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose of this paper is to conglomerate the fundamentals of Blockchain, AI (Artificial Intelligence) and DNA (Deoxyribonuc... Read More about KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme.

A comparison of deep learning techniques for corrosion detection (2022)
Conference Proceeding
Bolton, T., Bass, J., & Gaber, T. (2022). A comparison of deep learning techniques for corrosion detection. . https://doi.org/10.1007/978-3-031-20601-6_18

Corrosion - degradation in metal structures - is problematic, expensive to rectify, and can be unpredictable in the rate at which it spreads. Traditional preventative maintenance techniques are complemented by human visual inspection, in turn complem... Read More about A comparison of deep learning techniques for corrosion detection.

Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey (2022)
Journal Article
Mkaouer, M., Gaber, T., & Dagdia, Z. (2022). Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey. Applied Computational Intelligence and Soft Computing, 2(2), 173-194. https://doi.org/10.3934/aci.2022010

In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced gov... Read More about Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey.

A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms (2022)
Journal Article
A. Mohamed, E., Gaber, T., Karam, O., & Rashed, E. A. (2022). A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms. PLoS ONE, 17(10), https://doi.org/10.1371/journal.pone.0276523

Breast cancer is the second most frequent cancer worldwide, following lung cancer and the fifth leading cause of cancer death and a major cause of cancer death among women. In recent years, convolutional neural networks (CNNs) have been successfully... Read More about A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms.

A novel drone-station matching model in smart cities based on strict preferences (2022)
Journal Article
Nath, D., Bandyopadhyay, A., Rana, A., Gaber, T., & Hassanien, A. (2022). A novel drone-station matching model in smart cities based on strict preferences. Unmanned Systems, 1-11. https://doi.org/10.1142/s2301385023500115

There has been a considerable increase in the use of drones, or unmanned aerial vehicles (UAVs), in recent times, for a wide variety of purposes such as security, surveillance, delivery, search and rescue operations, penetration of inaccessible or un... Read More about A novel drone-station matching model in smart cities based on strict preferences.

A blockchain protocol for authenticating space communications between satellites constellations (2022)
Journal Article
Torky, M., Gaber, T., Goda, E., Snasel, V., & Hassanien, A. (2022). A blockchain protocol for authenticating space communications between satellites constellations. Aerospace, 9(9), https://doi.org/10.3390/aerospace9090495

Blockchain has found many applications, apart from Bitcoin, in different fields and it has the potential to be very useful in the satellite communications and space industries. Decentralized and secure protocols for processing and manipulating space... Read More about A blockchain protocol for authenticating space communications between satellites constellations.