Ahmad S. AlmogrenKing Saud University | KKUH · Department of Computer Science
Ahmad S. Almogren
Doctor of Philosophy
Cybersecurity Chair, Director
About
272
Publications
132,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,315
Citations
Introduction
Almogren is the head of the Cybersecurity Chair and a Professor of Computer Science at the CCIS at King Saud University.
He holds a master degree in computer science, a second master in software engineering and a doctorate in computer science from Southern Methodist University in the United States. He held many academic and administrative positions and worked as a consultant in many government agencies and the private sector. He supervises a number of doctorate, master and bachelor students.
Education
January 1994 - August 2002
Publications
Publications (272)
The Internet of Underwater Things (IoUTs) connects underwater devices to communicate, sense surroundings, and transmit data. Acoustic communication faces bandwidth limitations, making underwater wireless optical communication-free space optics (UWOC-FSO) hybrid systems a promising alternative. However, maintaining sufficient power budget and signal...
This paper explores the transformative potential of integrating Augmented Intelligence with Internet of Things (IoT) in autonomous vehicles, a concept we term AIoT. We begin by examining the critical roles of IoT and augmented intelligence in automotive technology, delineating their evolution and synergistic benefits when unified. The crux of our i...
The proliferation of Internet of Things (IoT) devices generates vast amounts of data, traditionally stored, processed, and analyzed using centralized systems, making them susceptible to attacks. Blockchain offers a solution by storing and securing IoT data in a distributed manner. However, the low performance and poor scalability of blockchain tech...
The increasing prevalence of DarkNet traffic poses significant challenges for network security. Despite improvements in machine learning techniques, most of the existing studies have not applied appropriate ensemble voting models on newer datasets like CIC-Darknet 2020. Some noteworthy works include methodologies that use CNN with K-Means for the c...
In the domain of software engineering, the accurate and effective classification of requirements is of paramount importance. Proper classifications of these requirements enable developers to create robust and error-free software solution. Traditional methods of user requirements classification face the issue of the reliance on manual processes, whi...
Cybersecurity threats have become more worldly, demanding advanced detection mechanisms with the exponential growth in digital data and network services. Intrusion Detection Systems (IDSs) are crucial in identifying illegitimate access or anomalous behaviour within computer network systems, consequently opposing sensitive information. Traditional I...
Background
In today’s digital age, various diseases drastically reduce people’s quality of life. Arthritis is one amongst the most common and debilitating maladies. Osteoarthritis affects several joints, including the hands, knees, spine, and hips. This study focuses on the medical disorder underlying Knee Osteoarthritis (KOA) which severely impair...
Detection of aerial activities, including drones and birds, has practical implications for automating bird surveys and developing radar systems for aerial object collision detection. Convolutional neural networks (CNNs) have been extensively utilized for image recognition and classification tasks, albeit prior research predominantly focuses on sing...
The demand for methods that automatically create text summaries from images containing many things has recently grown. Our research introduces a fresh and creative way to achieve this. We bring together the WordNet dictionary and the YOLO model to make this happen. YOLO helps us find where the things are in the images, while WordNet provides their...
Several parameters affect our brain's neuronal system and can be identified by analyzing electroencephalogram (EEG) signals. One of the parameters is alcoholism, which affects the pattern of our EEG signals. By analyzing these EEG signals, one can derive information regarding the alcoholic or normal stage of an individual. Many road accident cases...
Medical image security is paramount in the digital era but remains a significant challenge. This paper introduces an innovative zero-watermarking methodology tailored for medical imaging, ensuring robust protection without compromising image quality. We utilize Sped-up Robust features for high-precision feature extraction and singular value decompo...
In the development of image forensics, detection of Copy-Move Forgery (CMF) has become a major challenge due to the proliferation of image forgery techniques. The CMF is widely utilized to alter the content of the original image to spread false information or to use such forged digital images for illegal purposes e.g. false evidence in the court of...
Forest fires are the source of countless fatalities and extreme economic repercussions. The safe evacuation of residents of an area affected by forest fires is the highest priority of local authorities, and finding the most optimal course of action has been a primary research focus for years. Previous studies over several decades have attempted to...
A R T I C L E I N F O Keywords: Threat hunting Persistent adversary Elasticsearch Security information and event management SIEM Behavior-based detection Registry analysis Cybersecurity posture A B S T R A C T The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks...
Persistence behavior is a tactic advanced adversaries use to maintain unauthorized access and control of compromised assets over extended periods. Organizations can efficiently detect persistent adversaries and reduce the growing risks posed by highly skilled cyber threats by embracing creative techniques and utilizing sophisticated tools. By takin...
A serious eye condition called cataracts can cause blindness. Early and accurate cataract detection is the most effective method for reducing risk and averting blindness. The optic nerve head is harmed by the neurodegenerative condition known as glaucoma. Machine learning and deep learning systems for glaucoma and cataract detection have recently r...
The paper addresses the issue of ensuring the authenticity and copyright of medical images in telemedicine applications, with a specific emphasis on watermarking methods. While several systems only concentrate on identifying tampering in medical images, others also provide the capacity to restore the tampered regions upon detection. While several a...
The volume of data transferred across communication infrastructures has recently increased due to technological advancements in cloud computing, the Internet of Things (IoT), and automobile networks. The network systems transmit diverse and heterogeneous data in dispersed environments as communication technology develops. The communications using t...
The safety of SCUBA divers remains at high risk in deep-sea owing to multiple factors such as dangerous surrounding, rely upon technical equipment necessary for life support, decreased underwater navigation, and communication infrastructure. Gradual decrease and increase in water temperature and pressure, respectively corresponding to depth are amo...
We report the design of an all-fiber single-mode polarization maintaining widely tunable Ho-doped master oscillator power amplifier (MOPA) system operating in the wavelength range of 2005-2135 nm based on a pre-amplifier and two power amplification stages. The single clad Ho-doped active fibers in the ring cavity based master oscillator, pre-amplif...
In developing countries, smart grids are nonexistent, and electricity theft significantly hampers power supply. This research introduces a lightweight deep-learning model using monthly customer readings as input data. By employing careful direct and indirect feature engineering techniques, including Principal Component Analysis (PCA), t-distributed...
This paper provides the parallel distributed Kalman filter (PDKF) with non-aligned time indexes, which uses four processing nodes to run the linear Kalman filter in parallel. To provide outputs that are in sync with the time indexes that are now in effect, each processing node aggregates prior time indexes utilizing non-aligned time indexes. This m...
Given its detrimental effect on the brain, alcoholism is a severe disorder that can produce a variety of cognitive, emotional, and behavioral issues. Alcoholism is typically diagnosed using the CAGE assessment approach, which has drawbacks such as being lengthy, prone to mistakes, and biased. To overcome these issues, this paper introduces a novel...
As the energy management undergoes rapid transformations, there’s an imperative need for innovative energy management frameworks. Responding to this, our research introduces an advanced energy management framework, synergistically combining quantum computing advancements with a robust trust management system. At the core of our proposition is the u...
Holmium doped fiber amplifiers (HDFAs) have become a focus of researchers since they provide amplification in the very important spectral region around 2 μm wavelength. A major factor resulting in the performance degradation of HDFAs is the inhomogeneous energy transfer within Ho3+ ion-pairs in high-concentration Holmium doped fibers (HDFs), an eff...
The presence of the malicious internet of things (IoT) devices in wireless sensor networks (WSNs), in the underlying work, is identified using a private blockchain and interplanetary file system (IPFS) based system. In the proposed model, the registration of IoT devices is being done via the IoT device manager. After registration, the IoT devices s...
The Internet of Medical Things (IoMT) has recently become the norm in medical operations and emergency situations. A physician or a medical personnel is interested in accessing the patients' data from remote locations using IoMT. The patients' medical management system should allow their doctors and family members to have access to the data, especi...
Software Defined Networks (SDN) have revolutionized multimedia communication systems with their dynamic resource allocation and load balancing capabilities. However, ensuring security and trust within these networks poses significant challenges which is the aim of this research to improve SDN security and efficiency in consumer applications. The pr...
In the contemporary landscape of vehicular communications, the role of vehicular ad-hoc networks (VANETs) has become increasingly pivotal, transcending the capabilities of traditional mobile ad-hoc networks (MANETs). These advancements in VANETs play a critical role in enhancing traffic management systems, promoting collision prevention, bolstering...
6G heterogeneous wireless networks (HWNs) mark a significant advancement in network technologies, offering unparalleled opportunities to enhance quality of service (QoS) and optimize spatial spectrum utilization. Amidst these advancements, securing these sophisticated, ultra-dense 6G-HWNs becomes paramount, especially in the realm of consumer elect...
This study explores the fusion of Internet of Things (IoT) and advanced imaging technologies in the field of poultry farming, aiming to enhance both farm management and animal welfare. We investigate the application of IoT in a poultry farm environment, focusing on real-time monitoring of chickens for disease detection while ensuring data privacy d...
Metaverse is an emerging research area where substantially virtualized realities and interactive digital spaces meet through augmented reality (AR), virtual reality (VR), and Internet of Things (IoT). This amalgamation confers a multifaceted platform for healthcare innovation, extending from remote surgeries to immersive patient education. Neverthe...
As next-generation networking environments become increasingly complex and integral to the fabric of digital transformation as the traditional perimeter-based security model proves inadequate. The Zero Trust framework emerges as a critical solution to this challenge, advocating for a security model that assumes no implicit trust and requires verifi...
This study investigates the integration and utilization of diverse data forms within consumer electronics, with a particular emphasis on Internet of Things (IoT) technologies. We introduce innovative data fusion techniques designed to enhance decision-making precision in IoT-enabled consumer electronics. While our findings are relevant not only for...
In order to improve cybersecurity in newly developed network infrastructures, this research investigates the integration of blockchain technology with zero-trust security concepts. The zero-trust paradigm ensures continuous authentication across entities, in contrast to standard security models that often presuppose trust based on a network environ...
Stomach Adenocarcinoma (STAD) significantly impacts global cancer mortality rates. Recent strides in artificial intelligence (AI), machine learning (ML), and deep learning (DL) have primarily harnessed imaging techniques like CT, X-rays, PET, and MRI for cancer detection. Concurrently, the rapidly growing volume of genomic big data presents an unta...
Brain tumors, a significant health concern, are a leading cause of mortality globally, with an annual projected increase of 5% by the World Health Organization. The imperative for timely detection underscores the focus of this study, which systematically evaluates the efficacy of transfer learning techniques in the classification of brain tumors th...
New opportunities in the field of digital marketing, notably in the Metaverse, have been made possible by the rising use of 6G networks and blockchain technology. In the context of 6G and the Metaverse, this article seeks to examine the possibilities of blockchain-based digital marketing. It explores the use of blockchain technology in digital mark...
Model-driven development (MDD) in the Artificial Intelligence of Things (AIoT) domain faces significant challenges in ensuring the consistency and preservation of model properties during transformations, often leading to system inconsistencies. This research introduces the Property Preservation Framework (PPF), a novel approach fortified with a Mar...
The global surge in population, coupled with the continuous emergence of new digital devices, has significantly increased the worldwide demand for electricity, intensifying the existing energy crisis. Microgrids are pivotal in addressing the current needs of utility industries and driving innovation. However, numerous challenges remain, particularl...
The advancement of communication technologies and cloud systems has led to the emergence of the Healthcare-Consumer Internet of Things (H-CIoT) as a significant domain. This emergence has transformed the traditional healthcare system into the next generation of H-CIoT, characterized by higher connectivity and intelligence. Software-Defined Networki...
Surface material identification using hyperspectral imaging (HSI) analysis is a crucial and challenging issue in remote sensing. Researchers widely recognize that exploiting spectral-spatial data outperforms using spectral pixel-wise methods. Most of the work focuses on machine learning techniques to address issues with HSI categorization. The semi...
This paper proposes an Enhanced Edge-Linked Caching (EELC) scheme for Internet of Things (IoT) environments under Information-Centric Networking (ICN), employing an advanced use of Proximal Policy Optimization (PPO), a form of deep reinforcement learning, to inform the caching decisions of edge nodes. The rapid proliferation of IoT devices has led...
Artificial intelligence (AI) is transforming the electrical grid by incorporating advanced communication protocols and novel monitoring infrastructure. This transformation alters traditional methods of electricity consumption and billing, shifting from manual meter reading to dynamic peak-hour tariff rates. While people are open to upgrading their...
The substantial growth in data volume has led to considerable technological obstacles on the Internet. In order to address the high volume of Internet traffic, the research community has investigated the improvement of Internet architecture by implementing centrality-based caching, which could involve collaborative efforts. Different centrality-bas...
Brain tumors are among the most significant and challenging medical conditions because of their sometimes-fatal outcomes and complexity of treatment options. Early, exact detection of brain tumors is essential for both the most effective treatment programs and much higher patient survival rates. Especially in complex cases, the use of ensemble mode...
The Internet of Things (IoT) network is extremely useful in many different fields, such as smart cities, the military, healthcare, business, and agriculture, among others. The security of IoT networks has long been a major concern. The nodes of the IoT network are openly accessible and are mostly deployed in hostile environments. Therefore, they ar...
This manuscript provides an in‐depth exploration of metaverses, charting their historical development, technological foundations, and potential multifarious applications. It critically assesses the prevailing challenges and explores potential pathways for the evolution of these expansive, virtual environments. In shedding light on the wide‐ranging...
Recent advancements in the domain of virtual reality have culminated in the development of the Metaverse, a comprehensive virtual environment fostering interactions among individuals and digital entities. This study undertakes an analytical exploration of the Metaverse’s implications on mental health, overall well-being, and disability with a focus...
In the rapidly evolving landscape of distributed systems, security stands as a significant challenge, especially in the face of network node attacks. Such threats introduce profound complexities into the dynamics of security protocols, trust management, and resource allocation, issues further amplified by the metaverse’s exponential growth. This pa...
Background
Alcoholism is a catastrophic condition that causes brain damage as well as neurological, social, and behavioral difficulties.
Limitations
This illness is often assessed using the Cut down, Annoyed, Guilty, and Eye-opener examination technique, which assesses the intensity of an alcohol problem. This technique is protracted, arduous, err...
Remote patient monitoring (RPM) has become a crucial tool for healthcare professionals in the monitoring and management of patients, particularly for patients with chronic illnesses. RPM has undergone improvements in its capability to deliver real-time data and information to healthcare practitioners as the Internet of Medical Things (IoMT) devices...
Digital healthcare services have seen significant growth in this decade and many new technologies have been thoroughly examined to provide efficient services through secure infrastructures. The Internet of Medical Things (IoMT) revitalizes a healthcare infrastructure by creating an interconnected, intelligent, accessible, and efficient network. Whi...
As smart home networks become increasingly complex and dynamic, maintaining trust between the various devices and services is crucial. Existing trust management approaches face challenges such as high computational overhead and difficulty in selecting optimal parameters. To address these challenges, we propose a new method for trust management in s...
The Internet of Things (IoT) is widely used to reduce human dependence. It is a network of interconnected smart devices with internet connectivity that can send and receive data. However, the rapid growth of IoT devices has raised security and privacy concerns, with the identification and removal of compromised and malicious nodes being a major cha...
The Internet of Things (IoT) has revolutionized the world with its diverse applications and smart connected devices. These IoT devices communicate with each other without human intervention and make life easier in many ways. However, the independence of these devices raises several significant concerns, such as security and privacy preservation due...
As Intelligent Cyber-Physical Transportation Systems (ICPTS) become more complex and interconnected, ensuring secure and reliable communication between components and entities becomes a critical challenge. In this paper, we propose a Context-Aware Cognitive Memory Trust Management System (CACMTM) for ICPTS that leverages game theory to model trust...
With the advent of the sixth-generation (6G) network and the expanding realm of the Internet of Things (IoT), the challenge of optimizing network communication within these rapidly evolving landscapes has become paramount. This article explores the domain of biomimetic algorithms, recognizing their potential as sophisticated solutions in these comp...
Through the development of digital twins, the Industrial Internet of Things (IIoT) has fundamentally changed how the physical and digital worlds are integrated. The purpose of this study is to examine how digital twins can improve production control in smart consumer electronics factories. In particular, the study examines how well digital twins wo...
In the ever-expanding Internet of Things (IoT) domain, the production of data has reached an unparalleled scale. This massive data is processed to glean invaluable insights, accelerating a myriad of decision-making processes. Nevertheless, the privacy and security of such information present formidable challenges. This study proposes an innovative...
As blockchain technology and decentralized systems evolve, the security of these infrastructures faces challenges from increasingly sophisticated threats. This research introduces a methodology designed to strengthen the security parameters of distributed systems, with a specific focus on its applicability within the Metaverse. Our probabilistic tr...