Search

Your search keyword '"Fuad A. Ghaleb"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Fuad A. Ghaleb" Remove constraint Author: "Fuad A. Ghaleb" Language english Remove constraint Language: english
46 results on '"Fuad A. Ghaleb"'

Search Results

1. An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks

2. An efficient intrusion detection model based on convolutional spiking neural network

3. Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection

4. An Attention-Based Convolutional Neural Network for Intrusion Detection Model

5. Ensemble Synthesized Minority Oversampling-Based Generative Adversarial Networks and Random Forest Algorithm for Credit Card Fraud Detection

6. A Kullback-Liebler divergence-based representation algorithm for malware detection

7. Deep-Ensemble and Multifaceted Behavioral Malware Variant Detection Model

8. Dynamic Routing and Failure Recovery Approaches for Efficient Resource Utilization in OpenFlow-SDN: A Survey

9. An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network

10. Improving Solar Radiation Forecasting Utilizing Data Augmentation Model Generative Adversarial Networks with Convolutional Support Vector Machine (GAN-CSVR)

11. A Review on Neural Network Based Models for Short Term Solar Irradiance Forecasting

12. Similarity-Based Hybrid Malware Detection Model Using API Calls

13. PEW: Prediction-Based Early Dark Cores Wake-up Using Online Ridge Regression for Many-Core Systems

14. An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning

15. Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques

16. Web-Informed-Augmented Fake News Detection Model Using Stacked Layers of Convolutional Neural Network and Deep Autoencoder

17. A Semisupervised Concept Drift Adaptation via Prototype-Based Manifold Regularization Approach with Knowledge Transfer

18. Dynamic Extraction of Initial Behavior for Evasive Malware Detection

19. Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach

20. Database Forensic Investigation Process Models: A Review

21. A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

22. Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack

23. Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique

24. Malware Detection Issues, Challenges, and Future Directions: A Survey

25. Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network

26. Prototype Regularized Manifold Regularization Technique for Semi-Supervised Online Extreme Learning Machine

27. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning

28. A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network

29. Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions

30. IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection

31. Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine

32. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review

33. Route Path Selection Optimization Scheme Based Link Quality Estimation and Critical Switch Awareness for Software Defined Networks

34. Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey

35. PEW: Prediction-Based Early Dark Cores Wake-up Using Online Ridge Regression for Many-Core Systems

36. C-SAR: Class-Specific and Adaptive Recognition for Arabic Handwritten Cheques

37. A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT

38. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review

39. A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

40. Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach

41. Enhancement of thermal comfort in a large space building

42. Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection

43. Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification

44. Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks

45. Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET

46. Two-stage motion artefact reduction algorithm for electrocardiogram using weighted adaptive noise cancelling and recursive Hampel filter.

Catalog

Books, media, physical & digital resources