Items where Author is "Ghanem, Mohamed Chahine"

Up a level
Export as [feed] Atom [feed] RSS
[tool] Batch List
Group by: Item Type | No Grouping
Number of items: 11.

Article

Hamouda, Djallel, Ferrag, Mohamed Amine, Nadjette, Benhamida, Hamid, Seridi and Ghanem, Mohamed Chahine (2024) Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques. Internet of Things, 26 ((2024)). p. 101149. ISSN 2542-6605

Dunsin, Dipo, Ghanem, Mohamed Chahine, Ouazzane, Karim and Vassilev, Vassil (2024) A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48 (301675). pp. 1-22. ISSN 2666-2817

Maosa, Herbert, Ouazzane, Karim and Ghanem, Mohamed Chahine (2024) A hierarchical security event correlation model for real-time threat detection and response. Network, 4 (1). pp. 68-90. ISSN 2673-8732

Ghanem, Mohamed Chahine, Uribarri, Maider D., Djemai, Ramzi, Dunsin, Dipo and Araujo, Istteffanny Isloure (2023) A novel hybrid method for effective identification and extraction of digital evidence masked by steganographic techniques in WAV and MP3 files. Journal of Information Security and Cybercrimes Research, 6 (2). pp. 89-104. ISSN 1658-7790

Ghanem, Mohamed Chahine, Mulvihill, Patrick, Ouazzane, Karim, Djemai, Ramzi and Dunsin, Dipo (2023) D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities. Journal of Cybersecurity and Privacy, 3 (4). pp. 808-820. ISSN 2624-800X

Ghanem, Mohamed Chahine, Chen, Thomas, Ferrag, Mohamed Amine and Kettouch, Mohyi Eddine (2023) ESASCF: expertise extraction, generalization and reply framework for optimized automation of network security compliance. IEEE Access, 11. pp. 129840-129853. ISSN 2169-3536

Ghanem, Mohamed Chahine, Chen, Thomas and Nepomuceno, Erivelton G. (2022) Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks. Journal of Intelligent Information Systems, 2022. ISSN 0925-9902

Dunsin, Dipo, Ghanem, Mohamed Chahine and Quazzane, Karim (2022) The use of artificial intelligence in digital forensics and incident response in a constrained environment. International Journal of Information and Communication Engineering, 16 (8). pp. 280-285. ISSN 2010-4057

Ghanem, Mohamed Chahine and Chen, Thomas (2020) Reinforcement learning for efficient network penetration testing. Information, 11 (1 [6]). ISSN 2078-2489

Conference or Workshop Item

Dunsin, Dipo, Ghanem, Mohamed Chahine and Ouazzane, Karim (2022) The use of artificial intelligence in digital forensics and incident response (DFIR) in a constrained environment. In: International Conference on Digital Forensics and Security of Cloud Computing (ICDFSCC), 17-18 May 2022, Australia.

Ghanem, Mohamed Chahine and Ratnayake, Deepthi N. (2016) Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 13-14 June 2016, London.

This list was generated on Tue Apr 16 20:12:11 2024 UTC.