Skip to main content

and
  1. Article

    Open Access

    D2TS: a dual diversity tree selection approach to pruning of random forests

    Random Forest is one of the most effective classification techniques. It is an ensemble technique with typically decision trees as its classifiers. Each tree votes for an outcome when a new instance is being c...

    Hani Ragab Hassen, Yassin Zain Alabdeen in International Journal of Machine Learning … (2023)

  2. No Access

    Chapter and Conference Paper

    Android Malware Detection Using Control Flow Graphs and Text Analysis

    The Android OS has a massive user-base with hundreds of millions of devices. Due to the growth of this platform, an increasing number of malicious applications are becoming available to download online. We pro...

    Ali Muzaffar, Ahmed Hamza Riaz in Proceedings of the International Conferenc… (2023)

  3. No Access

    Chapter and Conference Paper

    Transformer-Encoder Generated Context-Aware Embeddings for Spell Correction

    In this paper, we propose a novel approach for context-aware spell correction in text documents. We present a deep learning model that learns a context-aware character-level map** of words to a compact embed...

    Noufal Samsudin, Hani Ragab Hassen in Artificial Neural Networks in Pattern Recognition (2023)

  4. No Access

    Chapter and Conference Paper

    DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection

    DroidDissector is an extraction tool for both static and dynamic features. The aim is to provide Android malware researchers and analysts with an integrated tool that can extract all of the most widely used fe...

    Ali Muzaffar, Hani Ragab Hassen in Proceedings of the International Conferenc… (2023)

  5. No Access

    Chapter and Conference Paper

    NTFA: Network Flow Aggregator

    Network intrusion detection systems (NIDS) play a vital role in defending against cybersecurity threats. One effective way of detecting attacks is to analyse their footprint on the network traffic logs. Flow-b...

    Kayvan Karim, Hani Ragab Hassen in Proceedings of the International Conferenc… (2023)

  6. No Access

    Book and Conference Proceedings

  7. No Access

    Chapter and Conference Paper

    Assessment of Pharmaceutical Patent Novelty with Siamese Neural Networks

    Patents in the pharmaceutical field fulfil an important role as they contain details of the final product that is the culmination of years of research and possibly millions of dollars of investment. It is cruc...

    Heba El-Shimy, Hind Zantout in Artificial Neural Networks in Pattern Reco… (2023)

  8. No Access

    Chapter and Conference Paper

    Availability in Openstack: The Bunny that Killed the Cloud

    The use of cloud is on the rise and is forecast to keep increasing exponentially in the coming years. Openstack is one of the major contributors to the cloud space and there are lot of providers using Openstac...

    Salih Ismail, Hani Ragab Hassen, Mike Just in Proceedings of the International Conferenc… (2022)

  9. No Access

    Chapter and Conference Paper

    Android Malware Detection Using API Calls: A Comparison of Feature Selection and Machine Learning Models

    Android has become a major target for malware attacks due its popularity and ease of distribution of applications. According to a recent study, around 11,000 new malware appear online on daily basis. Machine l...

    Ali Muzaffar, Hani Ragab Hassen in Proceedings of the International Conferenc… (2022)

  10. No Access

    Article

    Optimal Placement of Near Ground VHF/UHF Radio Communication Network as a Multi Objective Problem

    Ultra high frequency (UHF) and very high frequency (VHF) bands are widely used with near ground applications especially for communication purposes. However, due to the limited antenna height, the VHF/UHF signa...

    Hisham A. Shehadeh, Mohd. Yamani Idna Idris in Wireless Personal Communications (2020)

  11. No Access

    Article

    A self-managing volatile key scheme for wireless sensor networks

    The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with lim...

    Abdelkader Laouid, Abdelnasser Dahmani in Journal of Ambient Intelligence and Humani… (2019)

  12. Article

    Open Access

    A key management scheme evaluation using Markov processes

    Content access control aims at ensuring that, in a system with several resources, users can only access resources they are authorized to. Resources are encrypted using cryptographic keys. Generating, distribut...

    Hani Ragab-Hassen, Esma Lounes in International Journal of Information Security (2017)