Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems

    Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a ...

    Mahmuda Akter, Nour Moustafa, Benjamin Turnbull in Cognitive Computation (2024)

  2. Article

    A threat intelligence framework for protecting smart satellite-based healthcare networks

    Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical assets. Lightw...

    Muna Al-Hawawreh, Nour Moustafa, Jill Slay in Neural Computing and Applications (2024)

  3. Article

    Open Access

    An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks

    This paper investigates a wireless blockchain network with mobile edge computing in which Internet of Things (IoT) devices can behave as blockchain users (BUs). This blockchain network’s ultimate goal is to in...

    Reda M. Hussien, Amr A. Abohany, Nour Moustafa in Neural Computing and Applications (2023)

  4. No Access

    Chapter and Conference Paper

    An Explainable Intrusion Discovery Framework for Assessing Cyber Resilience in the Internet of Things Networks

    Cyber hardening systems, such as intrusion detection and firewalls, are no longer sufficient to keep cyber systems safe from today’s smart and well-resourced attackers. However, these systems have high false-p...

    Mohammed T. Masud, Marwa Keshk in Proceedings of the Future Technologies Con… (2023)

  5. Article

    Open Access

    Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection

    The uses of machine learning (ML) technologies in the detection of network attacks have been proven to be effective when designed and evaluated using data samples originating from the same organisational netwo...

    Mohanad Sarhan, Siamak Layeghy, Nour Moustafa in Journal of Network and Systems Management (2022)

  6. No Access

    Article

    Privacy-preserving big data analytics for cyber-physical systems

    Cyber-physical systems (CPS) generate big data collected from combining physical and digital entities, but the challenge of CPS privacy-preservation demands further research to protect CPS sensitive informatio...

    Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull in Wireless Networks (2022)

  7. No Access

    Chapter

    Unsupervised Deep Learning for Secure Internet of Things

    This chapter elaborates on the potential of unsupervised deep learning solutions for assuring the security of IoT-based systems to give the reader an insightful discussion of how these solutions could satisfy ...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  8. No Access

    Chapter

    Deep Reinforcement Learning for Secure Internet of Things

    Reinforcement learning (RL) is identified as a branch of artificial intelligence (AI) the seek to addresses the dilemma of automated learning of ideal determinations throughout time, which is a popular and bro...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  9. No Access

    Chapter

    Internet of Things, Preliminaries and Foundations

    This chapter mainly presents a detailed discussion of the IoT technologies and dependent systems with the main objectives of emphasizing the main attributes of IoT systems that might possibly threaten the secu...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  10. No Access

    Chapter

    Digital Forensics in Internet of Things

    As IoT technology becomes an integral part of everyday life, enhancing productivity for businesses through automation, it should come as no surprise that attackers would seek to exploit these systems and the s...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  11. No Access

    Chapter

    Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective

    The Internet of Things (IoT) is a rapidly evolving technology that empowers billions of globally distributed physical things to be interconnected over the internet to capture, collect, exchange, and share a wi...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  12. No Access

    Chapter

    Internet of Things Security Requirements, Threats, Attacks, and Countermeasures

    This chapter elaborates on different security aspects to be taken into accounts during the development and the deployments of IoT architecture. To make the reader about the security of the IoT based system, th...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  13. No Access

    Chapter

    Challenges, Opportunities, and Future Prospects

    The central intention of this chapter is to discuss the primary security challenges in internet of things (IoT) environments with the main emphasis on the opportunities for deep learning for securing and maint...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  14. No Access

    Chapter

    Supervised Deep Learning for Secure Internet of Things

    This chapter elaborates on the potential of supervised deep learning solutions for fulfilling the security requirements of IoT-based systems with main aim to realize a reliable and trustworthy IoT environment.

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  15. No Access

    Chapter

    Semi-supervised Deep Learning for Secure Internet of Things

    Previous chapters demonstrate the great success achieved by principally in supervised settings, by leveraging a larger volume of precisely annotated dataset. Nevertheless, annotated data instances are frequent...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  16. No Access

    Chapter

    Federated Learning for Privacy-Preserving Internet of Things

    The rapid evolution of the Internet of Things (IoT) and relevant applications have been paving the way toward the fulfillment of smart cities. Smart cities are thought to come up with multiple crucial smart Io...

    Mohamed Abdel-Basset, Nour Moustafa in Deep Learning Techniques for IoT Security … (2022)

  17. No Access

    Chapter and Conference Paper

    A Novel Cognitive Computing Technique Using Convolutional Networks for Automating the Criminal Investigation Process in Policing

    Criminal Investigation (CI) plays an important role in policing, where police use various traditional techniques to investigate criminal activities such as robbery and assault. However, the techniques should h...

    Francesco Schiliro, Amin Beheshti, Nour Moustafa in Intelligent Systems and Applications (2021)

  18. No Access

    Chapter and Conference Paper

    A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks

    Security solutions, especially intrusion detection and blockchain, have been individually employed in the cloud for detecting cyber threats and preserving private data. Both solutions demand ensembled models-b...

    Osama Alkadi, Nour Moustafa, Benjamin Turnbull in Intelligent Systems and Applications (2021)

  19. No Access

    Chapter and Conference Paper

    NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems

    Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have become a promising tool to protect networks against cyberattacks. A wide range of datasets are publicly available and have been used...

    Mohanad Sarhan, Siamak Layeghy, Nour Moustafa in Big Data Technologies and Applications (2021)

  20. Chapter and Conference Paper

    Correction to: A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems

    The original version of this chapter was revised. The following corrections have been incorporated:

    Waleed Yamany, Nour Moustafa in AI 2020: Advances in Artificial Intelligen… (2020)

previous disabled Page of 2