Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems

OA Wahab, A Mourad, H Otrok… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The communication and networking field is hungry for machine learning decision-making
solutions to replace the traditional model-driven approaches that proved to be not rich …

[HTML][HTML] Security in product lifecycle of IoT devices: A survey

N Yousefnezhad, A Malhi, K Främling - Journal of Network and Computer …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …

CNN-based network intrusion detection against denial-of-service attacks

J Kim, J Kim, H Kim, M Shim, E Choi - Electronics, 2020 - mdpi.com
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a
variety of fields including industry, national defense, and healthcare. Traditional intrusion …

Intrusion detection in the iot under data and concept drifts: Online deep learning approach

OA Wahab - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Although the existing machine learning-based intrusion detection systems in the Internet of
Things (IoT) usually perform well in static environments, they struggle to preserve their …

Deep and reinforcement learning for automated task scheduling in large‐scale cloud computing systems

G Rjoub, J Bentahar, O Abdel Wahab… - Concurrency and …, 2021 - Wiley Online Library
Cloud computing is undeniably becoming the main computing and storage platform for
today's major workloads. From Internet of things and Industry 4.0 workloads to big data …

Autonomous robotic manipulation: real‐time, deep‐learning approach for gras** of unknown objects

MH Sayour, SE Kozhaya, SS Saab - Journal of Robotics, 2022 - Wiley Online Library
Recent advancement in vision‐based robotics and deep‐learning techniques has enabled
the use of intelligent systems in a wider range of applications requiring object manipulation …

Analyzing strategies in a green e-commerce supply chain with return policy and exchange offer

C Mondal, BC Giri - Computers & Industrial Engineering, 2022 - Elsevier
Due to groundbreaking rise of e-commerce and growing trends of customers' environmental
mindfulness, recently, more and more manufacturers are willing to produce eco-friendly …

Trust-driven reinforcement selection strategy for federated learning on IoT devices

G Rjoub, OA Wahab, J Bentahar, A Bataineh - Computing, 2024 - Springer
Federated learning is a distributed machine learning approach that enables a large number
of edge/end devices to perform on-device training for a single machine learning model …

Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats

PD Harms, A Marbut, AC Johnston, P Lester… - Journal of Information …, 2022 - Elsevier
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …

Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics

KS Huancayo Ramos, MA Sotelo Monge… - Sensors, 2020 - mdpi.com
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide
heterogeneity of endpoint devices at the Edge of the emerging communication environments …