Picture for Abdallah Moubayed

Abdallah Moubayed

Forensic Data Analytics for Anomaly Detection in Evolving Networks

Add code
Aug 17, 2023
Viaarxiv icon

Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection

Add code
Jul 24, 2021
Figure 1 for Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection
Figure 2 for Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection
Figure 3 for Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection
Figure 4 for Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection
Viaarxiv icon

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Add code
May 26, 2021
Figure 1 for MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles
Figure 2 for MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles
Figure 3 for MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles
Figure 4 for MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles
Viaarxiv icon

Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities

Add code
Jan 11, 2021
Figure 1 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 2 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 3 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 4 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Viaarxiv icon

Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

Add code
Dec 25, 2020
Figure 1 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Figure 2 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Viaarxiv icon

DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

Add code
Dec 25, 2020
Figure 1 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 2 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 3 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 4 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Viaarxiv icon

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Add code
Dec 16, 2020
Figure 1 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 2 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 3 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Viaarxiv icon

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Add code
Dec 16, 2020
Figure 1 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 2 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 3 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 4 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Viaarxiv icon

Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing

Add code
Sep 04, 2020
Figure 1 for Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing
Figure 2 for Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing
Viaarxiv icon

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Add code
Aug 09, 2020
Figure 1 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 2 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 3 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 4 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Viaarxiv icon