Search Results for author: Abdallah Moubayed

Found 17 papers, 2 papers with code

A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective

no code implementations10 Jan 2024 Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah

Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods.

Forensic Data Analytics for Anomaly Detection in Evolving Networks

no code implementations17 Aug 2023 Li Yang, Abdallah Moubayed, Abdallah Shami, Amine Boukhtouta, Parisa Heidari, Stere Preda, Richard Brunner, Daniel Migault, Adel Larabi

In the prevailing convergence of traditional infrastructure-based deployment (i. e., Telco and industry operational networks) towards evolving deployments enabled by 5G and virtualization, there is a keen interest in elaborating effective security controls to protect these deployments in-depth.

Feature Engineering Intrusion Detection +1

Intelligent Transportation Systems' Orchestration: Lessons Learned & Potential Opportunities

no code implementations5 May 2022 Abdallah Moubayed, Abdallah Shami, Abbas Ibrahim

This growth has led to the need for new communication technologies that will promote this transformation.

Federated Learning

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

1 code implementation26 May 2021 Li Yang, Abdallah Moubayed, Abdallah Shami

In this paper, the vulnerabilities of intra-vehicle and external networks are discussed, and a multi-tiered hybrid IDS that incorporates a signature-based IDS and an anomaly-based IDS is proposed to detect both known and unknown attacks on vehicular networks.

Autonomous Vehicles Intrusion Detection

Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities

no code implementations11 Jan 2021 MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Machine learning (ML) provides a mechanism for humans to process large amounts of data, gain insights about the behavior of the data, and make more informed decision based on the resulting analysis.

BIG-bench Machine Learning

Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

no code implementations25 Dec 2020 Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

The field of e-learning has emerged as a topic of interest in academia due to the increased ease of accessing the Internet using using smart-phones and wireless devices.

DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

no code implementations25 Dec 2020 Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

Moreover, the observed trends are validated by studying the same features in an unlabeled dataset using K-means clustering algorithm and through applying the developed ensemble learning classifier.

BIG-bench Machine Learning Clustering +1

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

no code implementations16 Dec 2020 Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami

To that end, this paper proposes a novel optimized ML-based framework to detect botnets based on their corresponding DNS queries.

feature selection

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

no code implementations16 Dec 2020 MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami

Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score, highlighting its effectiveness and robustness for the detection of botnet attacks in IoT environments.

Bayesian Optimization BIG-bench Machine Learning +1

Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing

no code implementations4 Sep 2020 Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami

Adopting effective and efficient spectrum sharing mechanisms is in itself a challenging task given the multitude of levels and techniques that can be integrated to enable it.

BIG-bench Machine Learning

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

no code implementations9 Aug 2020 MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Cyber-security garnered significant attention due to the increased dependency of individuals and organizations on the Internet and their concern about the security and privacy of their online activities.

BIG-bench Machine Learning feature selection +1

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

no code implementations8 Jun 2020 Abdallah Moubayed, Emad Aqeeli, Abdallah Shami

This paper builds on our previous work in [1], which only proposed majority-voting based classifier, by proposing an ensemble-based feature selection and bagging classification model to detect DNS typo-squatting attack.

feature selection General Classification

Softwarization, Virtualization, & Machine Learning For Intelligent & Effective V2X Communications

no code implementations8 Jun 2020 Abdallah Moubayed, Abdallah Shami

Concepts such as softwarization, virtualization, and machine learning will be key components as innovative and flexible enablers of such networks.

BIG-bench Machine Learning Edge-computing

Systematic Ensemble Model Selection Approach for Educational Data Mining

no code implementations13 May 2020 MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

A plethora of research has been done in the past focusing on predicting student's performance in order to support their development.

BIG-bench Machine Learning Model Selection

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

1 code implementation18 Oct 2019 Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami

The results from the implementation of the proposed intrusion detection system on standard data sets indicate that the system has the ability to identify various cyber-attacks in the AV networks.

Autonomous Vehicles Ensemble Learning +2

Cannot find the paper you are looking for? You can Submit a new open access paper.