Picture for Mahmoud Abdelsalam

Mahmoud Abdelsalam

Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges

Add code
Oct 14, 2024
Figure 1 for Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges
Figure 2 for Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges
Figure 3 for Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges
Figure 4 for Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges
Viaarxiv icon

Machine Learning in Access Control: A Taxonomy and Survey

Add code
Jul 04, 2022
Figure 1 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 2 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 3 for Machine Learning in Access Control: A Taxonomy and Survey
Figure 4 for Machine Learning in Access Control: A Taxonomy and Survey
Viaarxiv icon

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Add code
May 19, 2021
Figure 1 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 2 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 3 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Figure 4 for Analyzing Machine Learning Approaches for Online Malware Detection in Cloud
Viaarxiv icon

Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case

Add code
Apr 13, 2020
Figure 1 for Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case
Figure 2 for Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case
Viaarxiv icon

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Add code
Feb 15, 2020
Figure 1 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 2 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 3 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Figure 4 for Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
Viaarxiv icon