Skip to main content

and
  1. Article

    Open Access

    SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems

    Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a ...

    Mahmuda Akter, Nour Moustafa, Benjamin Turnbull in Cognitive Computation (2024)

  2. Article

    A threat intelligence framework for protecting smart satellite-based healthcare networks

    Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical assets. Lightw...

    Muna Al-Hawawreh, Nour Moustafa, Jill Slay in Neural Computing and Applications (2024)

  3. Article

    Open Access

    An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks

    This paper investigates a wireless blockchain network with mobile edge computing in which Internet of Things (IoT) devices can behave as blockchain users (BUs). This blockchain network’s ultimate goal is to in...

    Reda M. Hussien, Amr A. Abohany, Nour Moustafa in Neural Computing and Applications (2023)

  4. Article

    Open Access

    Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection

    The uses of machine learning (ML) technologies in the detection of network attacks have been proven to be effective when designed and evaluated using data samples originating from the same organisational netwo...

    Mohanad Sarhan, Siamak Layeghy, Nour Moustafa in Journal of Network and Systems Management (2022)

  5. No Access

    Chapter and Conference Paper

    NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems

    Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have become a promising tool to protect networks against cyberattacks. A wide range of datasets are publicly available and have been used...

    Mohanad Sarhan, Siamak Layeghy, Nour Moustafa in Big Data Technologies and Applications (2021)

  6. Chapter and Conference Paper

    Correction to: A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems

    The original version of this chapter was revised. The following corrections have been incorporated:

    Waleed Yamany, Nour Moustafa in AI 2020: Advances in Artificial Intelligen… (2020)

  7. No Access

    Reference Work Entry In depth

    Security and Privacy in 4G/LTE Network

    Nour Moustafa, Jiankun Hu in Encyclopedia of Wireless Networks (2020)

  8. No Access

    Chapter and Conference Paper

    A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems

    Smart power grids suffer from coordinated attacks that exploit both their physical and cyber layers. It is an inevitable requirement to study power systems under such complex hacking scenarios to discover the ...

    Waleed Yamany, Nour Moustafa in AI 2020: Advances in Artificial Intelligen… (2020)

  9. No Access

    Chapter and Conference Paper

    Probability Risk Identification Based Intrusion Detection System for SCADA Systems

    As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cybe...

    Thomas Marsden, Nour Moustafa, Elena Sitnikova in Mobile Networks and Management (2018)

  10. No Access

    Living Reference Work Entry In depth

    Security and Privacy in 4G/LTE Network

    Nour Moustafa, Jiankun Hu in Encyclopedia of Wireless Networks

  11. No Access

    Chapter and Conference Paper

    Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning

    The protection of operating systems from the current cyber threats has paramount importance. This importance is reflected by the functional dependency of any known or unknown cyber-attack upon the machines ope...

    Waqas Haider, Jiankun Hu, Nour Moustafa in Mobile Networks and Management (2018)

  12. Chapter and Conference Paper

    A Network Forensic Scheme Using Correntropy-Variation for Attack Detection

    Network forensic techniques help track cyber attacks by monitoring and analyzing network traffic. However, due to the large volumes of data in modern networks and sophisticated attacks that mimic normal behavi...

    Nour Moustafa, Jill Slay in Advances in Digital Forensics XIV (2018)

  13. No Access

    Chapter and Conference Paper

    Towards Develo** Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques

    The IoT is a network of interconnected everyday objects called “things” that have been augmented with a small measure of computing capabilities. Lately, the IoT has been affected by a variety of different botn...

    Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova in Mobile Networks and Management (2018)

  14. No Access

    Chapter

    Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models

    An intrusion detection system has become a vital mechanism to detect a wide variety of malicious activities in the cyber domain. However, this system still faces an important limitation when it comes to detect...

    Nour Moustafa, Gideon Creech, Jill Slay in Data Analytics and Decision Support for Cy… (2017)