no code implementations • 10 Jan 2024 • Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah
Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods.
no code implementations • 17 Aug 2023 • Li Yang, Abdallah Moubayed, Abdallah Shami, Amine Boukhtouta, Parisa Heidari, Stere Preda, Richard Brunner, Daniel Migault, Adel Larabi
In the prevailing convergence of traditional infrastructure-based deployment (i. e., Telco and industry operational networks) towards evolving deployments enabled by 5G and virtualization, there is a keen interest in elaborating effective security controls to protect these deployments in-depth.
no code implementations • 5 May 2022 • Abdallah Moubayed, Abdallah Shami, Abbas Ibrahim
This growth has led to the need for new communication technologies that will promote this transformation.
no code implementations • 24 Jul 2021 • Li Yang, Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault
Content delivery networks (CDNs) provide efficient content distribution over the Internet.
1 code implementation • 26 May 2021 • Li Yang, Abdallah Moubayed, Abdallah Shami
In this paper, the vulnerabilities of intra-vehicle and external networks are discussed, and a multi-tiered hybrid IDS that incorporates a signature-based IDS and an anomaly-based IDS is proposed to detect both known and unknown attacks on vehicular networks.
no code implementations • 11 Jan 2021 • MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami
Machine learning (ML) provides a mechanism for humans to process large amounts of data, gain insights about the behavior of the data, and make more informed decision based on the resulting analysis.
no code implementations • 25 Dec 2020 • Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya
The field of e-learning has emerged as a topic of interest in academia due to the increased ease of accessing the Internet using using smart-phones and wireless devices.
no code implementations • 25 Dec 2020 • Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya
Moreover, the observed trends are validated by studying the same features in an unlabeled dataset using K-means clustering algorithm and through applying the developed ensemble learning classifier.
no code implementations • 16 Dec 2020 • Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami
To that end, this paper proposes a novel optimized ML-based framework to detect botnets based on their corresponding DNS queries.
no code implementations • 16 Dec 2020 • MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami
Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score, highlighting its effectiveness and robustness for the detection of botnet attacks in IoT environments.
no code implementations • 4 Sep 2020 • Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami
Adopting effective and efficient spectrum sharing mechanisms is in itself a challenging task given the multitude of levels and techniques that can be integrated to enable it.
no code implementations • 9 Aug 2020 • MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami
Cyber-security garnered significant attention due to the increased dependency of individuals and organizations on the Internet and their concern about the security and privacy of their online activities.
no code implementations • 9 Jun 2020 • MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami
Furthermore, this work aims to predict the students' performance at two stages of course delivery (20% and 50% respectively).
no code implementations • 8 Jun 2020 • Abdallah Moubayed, Emad Aqeeli, Abdallah Shami
This paper builds on our previous work in [1], which only proposed majority-voting based classifier, by proposing an ensemble-based feature selection and bagging classification model to detect DNS typo-squatting attack.
no code implementations • 8 Jun 2020 • Abdallah Moubayed, Abdallah Shami
Concepts such as softwarization, virtualization, and machine learning will be key components as innovative and flexible enablers of such networks.
no code implementations • 13 May 2020 • MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami
A plethora of research has been done in the past focusing on predicting student's performance in order to support their development.
1 code implementation • 18 Oct 2019 • Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami
The results from the implementation of the proposed intrusion detection system on standard data sets indicate that the system has the ability to identify various cyber-attacks in the AV networks.