Items where Author is "Ghanem, Mohamed Chahine"

Group by: Item Type | No Grouping
Number of items: 17.

Article

Dunsin, Dipo, Ghanem, Mohamed Chahine, Ouazzane, Karim and Vassilev, Vassil (2024) Reinforcement learning for an efficient and effective malware investigation during cyber Incident response. High-Confidence Computing. ISSN 2667-2952 (In Press)

Hamouda, Djallel, Ferrag, Mohamed Amine, Nadjette, Benhamida, Hamid, Seridi and Ghanem, Mohamed Chahine (2024) Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques. Internet of Things, 26 ((2024)). p. 101149. ISSN 2542-6605

Dunsin, Dipo, Ghanem, Mohamed Chahine, Ouazzane, Karim and Vassilev, Vassil (2024) A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48 (301675). pp. 1-22. ISSN 2666-2817

Maosa, Herbert, Ouazzane, Karim and Ghanem, Mohamed Chahine (2024) A hierarchical security event correlation model for real-time threat detection and response. Network, 4 (1). pp. 68-90. ISSN 2673-8732

Ghanem, Mohamed Chahine, Uribarri, Maider D., Djemai, Ramzi, Dunsin, Dipo and Araujo, Istteffanny Isloure (2023) A novel hybrid method for effective identification and extraction of digital evidence masked by steganographic techniques in WAV and MP3 files. Journal of Information Security and Cybercrimes Research, 6 (2). pp. 89-104. ISSN 1658-7790

Ghanem, Mohamed Chahine, Mulvihill, Patrick, Ouazzane, Karim, Djemai, Ramzi and Dunsin, Dipo (2023) D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities. Journal of Cybersecurity and Privacy, 3 (4). pp. 808-820. ISSN 2624-800X

Ghanem, Mohamed Chahine, Chen, Thomas, Ferrag, Mohamed Amine and Kettouch, Mohyi Eddine (2023) ESASCF: expertise extraction, generalization and reply framework for optimized automation of network security compliance. IEEE Access, 11. pp. 129840-129853. ISSN 2169-3536

Ghanem, Mohamed Chahine, Chen, Thomas and Nepomuceno, Erivelton G. (2022) Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks. Journal of Intelligent Information Systems, 2022. ISSN 0925-9902

Dunsin, Dipo, Ghanem, Mohamed Chahine and Quazzane, Karim (2022) The use of artificial intelligence in digital forensics and incident response in a constrained environment. International Journal of Information and Communication Engineering, 16 (8). pp. 280-285. ISSN 2010-4057

Ghanem, Mohamed Chahine and Chen, Thomas (2020) Reinforcement learning for efficient network penetration testing. Information, 11 (1 [6]). ISSN 2078-2489

Conference or Workshop Item

Ghanem, Mohamed Chahine (2024) Keynote ALIZZ BANK cyber security by design in banking: a critical need. In: ALIZZ BANK CYBER RESILIENCE, 17/12/2024, Muscat. (Unpublished)

Ghanem, Mohamed Chahine (2024) Advancing IoT and Cloud Security through LLMs, Federated Learning, and Reinforcement Learning. In: 7th IEEE Conference on Cloud and Internet of Things, 29-31 October 2024, Montreal, Canada.

Dunsin, Dipo, Ghanem, Mohamed Chahine, Ouazzane, Karim and Vassilev, Vassil (2024) A novel reinforcement learning model for post-incident malware investigations. In: The 11th IEEE International Conference on Social Networks Analysis, Management and Security, December 9-11, 2024, Gran Canaria, Spain. (In Press)

Ouazzane, Karim, Tang, Kai Hung Po Yung and Ghanem, Mohamed Chahine (2024) Optimal portfolio and trading strategy using machine learning. In: Global IEEE Congress on Emerging Technologies (GCET-2024), 9-11 December 2024, Gran Canaria, Spain. (In Press)

Ghanem, Mohamed Chahine (2023) Automation of digital crime investigation using Reinforcement Learning (RL). In: British Computer Society National Workshop on Cybercrime Forensics, 7 February 2023, Online / BCS Dorset branch.

Dunsin, Dipo, Ghanem, Mohamed Chahine and Ouazzane, Karim (2022) The use of artificial intelligence in digital forensics and incident response (DFIR) in a constrained environment. In: International Conference on Digital Forensics and Security of Cloud Computing (ICDFSCC), 17-18 May 2022, Australia.

Ghanem, Mohamed Chahine and Ratnayake, Deepthi N. (2016) Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 13-14 June 2016, London.

This list was generated on Sat Dec 21 22:20:20 2024 UTC.