about.jpg

Malware Detection Techniques

Computers and systems are vulnerable to many threats. Security researchers identified the malware as the major computers and systems threat. Malware can be classified into different types depending on the infection, attacking target, and persistence technique. In this paper, Malware detection techniques are observed with the identification of each technique's strengths and weaknesses points, followed by a comparison between all malware detection techniques. © 2022 IEEE.

Circuit Theory and Applications
Software and Communications

A Survey on Recommender Systems Challenges and Solutions

A recommender system is a set of tools for information retrieval. It improves access and proactively recommends items and services that match users' tastes by considering their explicit and implicit preferences and behaviors. Recommender systems have become very popular in the e-commerce field. Today, the internet is flooded with diverse information that makes it very difficult for the end-users to reach out for what they need. Recommender systems provide tailored views to users who are constantly adapted to the users' changing tastes. Although many recommendation techniques have been

Artificial Intelligence
Circuit Theory and Applications

Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks

The fast expansion of the Internet of Things (IoT) in the technology and communication industries necessitates a continuously updated cyber-security mechanism to keep protecting the systems' users from any possible attack that might target their data and privacy. Botnets pose a severe risk to the IoT, they use malicious nodes in order to compromise other nodes inside the network to launch several types of attacks causing service disruption. Examples of these attacks are Denial of Service (DoS), Distributed Denial of Service (DDoS), Service Scan, and OS Fingerprint. DoS and DDoS attacks are the

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

Active Directory Attacks—Steps, Types, and Signatures

Active Directory Domain is a Microsoft service that allows and facilitates the centralized administration of all workstations and servers in any environment. Due to the wide use and adoption of this service, it has become a target for many attackers. Active Directory attacks have evolved through years. The attacks target different functions and features provided by Active Directory. In this paper, we provide insights on the criticality, impact, and detection of Active Directory attacks. We review the different Active Directory attacks. We introduce the steps of the Active Directory attack and

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Mechanical Design

Using Blockchain Technology in MANETs Security

Many systems have recently begun to examine blockchain qualities in order to create cooperation enforcement methods. This paper provides a complete and extensive evaluation of work on multi-hop MANETs with blockchain-based trust control between nodes. We contextualize the snag of security in MANETs resulting from the lack of trust between the participating nodes. We present the blockchain concepts and discuss the limitation of the current blockchain in MANETs. We review the promising proposed ideas in the state-of-the-art based on research papers. Finally, we discuss and summarize strategies

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Dual-Level Sensor Selection with Adaptive Sensor Recovery to Extend WSNs’ Lifetime

Wireless sensor networks (WSNs) have garnered much attention in the last decades. Nowadays, the network contains sensors that have been expanded into a more extensive network than the internet. Cost is one of the issues of WSNs, and this cost may be in the form of bandwidth, computational cost, deployment cost, or sensors’ battery (sensor life). This paper proposes a dual-level sensor selection (DLSS) model used to reduce the number of sensors forming WSNs. The sensor reduction process is performed at two consecutive levels. First, a combination of the Fisher score method and ANOVA test at the

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Hybrid Global Optimization Algorithm for Feature Selection

This paper proposes Parallelized Linear Time-Variant Acceleration Coefficients and Inertial Weight of Particle Swarm Optimization algorithm (PLTVACIW-PSO). Its designed has introduced the benefits of Parallel computing into the combined power of TVAC (Time-Variant Acceleration Coefficients) and IW (Inertial Weight). Proposed algorithm has been tested against linear, non-linear, traditional, and multiswarm based optimization algorithms. An experimental study is performed in two stages to assess the proposed PLTVACIW-PSO. Phase I uses 12 recognized Standard Benchmarks methods to evaluate the

Artificial Intelligence
Healthcare
Energy and Water
Circuit Theory and Applications
Software and Communications
Mechanical Design

A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs

Software Defined Networking (SDN) is an emerging network platform, which facilitates centralised network management. The SDN enables the network operators to manage the overall network consistently and holistically, regardless the complexity of infrastructure devices. The promising features of the SDN enhance network security and facilitate the implementation of threat detection systems through software applications using open APIs. However, the emerging technology creates new security concerns and new threats that do not exist in the current traditional networks. Distributed Denial of Service

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Rough Sets Hybridization with Mayfly Optimization for Dimensionality Reduction

Big data is a vast amount of structured and unstructured data that must be dealt with on a regular basis. Dimensionality reduction is the process of converting a huge set of data into data with tiny dimensions so that equal information may be expressed easily. These tactics are frequently utilized to improve classification or regression challenges while dealing with machine learning issues. To achieve dimensionality reduction for huge data sets, this paper offers a hybrid particle swarm optimization-rough set PSO-RS and Mayfly algorithm-rough set MA-RS. A novel hybrid strategy based on the

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

MSDAR: Multi-Stage Dynamic Architecture Intrusion Detection System

Ad hoc networks have been through extensive research in the last decade. Even with their desirable characteristics, major issues related to their security need to be considered. Various security solutions have been proposed to reduce the risks of malicious actions. They mainly focus on key management, authentication, secure localization, and aggregation techniques. These techniques have been proposed to secure wireless communications but they can only deal with external threats. Therefore, they are considered the first line of defense. Intrusion detection systems are always required to

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Mechanical Design
Innovation, Entrepreneurship and Competitiveness