Browsing by Author "Mahmoud, Qusay H."
Now showing items 1-14 of 14
-
Claims-aware middleware for securing IoT services
George, Vathalloor Merin (2016-04-01)Take a look at the world around us. There has been tremendous change in the way of living. With the world around us getting smart, Internet of Things is gaining ground in our life. Applications like smart home and eHealth ... -
A contextual authentication framework for smart home environments
Ashibani, Yosef (2020-04-01)A smart home is one equipped with connected Internet-of-Things (IoT) devices that can be remotely accessed and controlled. Access to smart home devices is mostly achieved through smartphones and tablet computers, but this ... -
Design and development of a blockchain-based consent management system
Kakarlapudi, Prasanth Varma (2021-08-01)Data management is defined as obtaining, processing, safeguarding, and storing information about an organization to aid in making better business decisions for the firm. With the proliferation of smart devices, the amount ... -
Design and development of a machine learning-based framework for phishing website detection
Tang, Lizhen (2022-04-01)Phishing is a social engineering cyber attack to steal personal information from users. Attackers solicit individuals to click phishing links by sending them emails or social media text messages with deceptive content. ... -
Design and evaluation of a hybrid multi-task learning model for optimizing deep reinforcement learning agents
Vithayathil Varghese, Nelson (2021-04-01)Driven by recent technological advancements within the artificial intelligence domain, deep learning has emerged as a promising representation learning technique. This in turn has given rise to the evolution of deep ... -
Design and evaluation of GAN-based models for adversarial training robustness in deep learning
Zhao, Weimin (2023-04-01)Adversarial attacks show one of the generalization issues of current deep learning models on special distribution shifted data. The adversarial samples generated by the attack algorithm can introduce malicious behavior to ... -
Design and implementation of a component-based distributed system for text mining in social networks
Huang, Yu (2016)This report presents the design and implementation of a component-based distributed system for text mining in social networks. The system consists of three main types of components, data collection, data processing and ... -
A framework for anomalous activity analysis for intrusion detection with applications to IoT networks
Ullah, Imtiaz (2022-04-01)Computer systems have become an integral part of our daily lives. The Internet of Things (IoT) has recently attracted considerable attention in the information technology industry due to its various benefits. IoT activities ... -
A framework for integrating wireless sensors and cloud computing
Jassas, Mohammad (2015-01-01)Wireless sensors generate a large volume of data that require a highly scalable framework that enables storage, processing, and analysis. Cloud computing technology can provide unlimited storage in addition to a flexible ... -
A framework for proactive fault tolerance in cloud-IoT applications
Jassas, Mohammad (2022-04-01)Integrating Internet of Things (IoT) devices with the cloud has several benefits, including expanding local IoT resources and improving cloud-IoT application performance. Cloud computing can benefit from IoT devices and ... -
A framework for provisioning algorithms as a service
Qasem, Abdullah A. (2016-02-01)Designing, implementing and executing algorithms have become a relevant and important element in various fields. Public users and data researchers are interested in analyzing and interpreting data with shorter execution ... -
A reliability-aware framework for service-based software development
Andrusiak, Ian (2017-01-01)It is becoming common to see software applications taking advantage of web services available publicly to meet their needs, rather than developing an in-house solution. This introduces the problem where failures can occur ... -
A supervised machine learning-based framework to detect low-level fault injections in software systems
Gangolli, Aakash Anil (2022-08-01)Fault injection attacks inject faults into system components, inducing abnormal software behavior. Software vulnerability analysis cannot prevent new attack vectors without software modifications. Attack detection methods ... -
A system framework for non-intrusive monitoring of HMI states for detecting human-in-the-loop error precursors
Singh, Harshvardhan P. (2020-04-01)Past industrial accidents suggest that increased automation has had an adverse effect on operator situational awareness (SA) and Human-in-the-Loop (HITL) errors. More so, any current automation is not yet capable of providing ...