Houssain KettaniAl Akhawayn University · Computer Science
Houssain Kettani
Ph.D. Electrical Engineering
Cyber Security, Data Analytics
About
94
Publications
169,196
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
798
Citations
Introduction
Dr. Houssain Kettani received the Bachelor's degree in Electrical and Electronic Engineering from Eastern Mediterranean University, Cyprus, and Master’s and Doctorate degrees both in Electrical Engineering from the University of Wisconsin, Madison. Dr. Kettani has over twenty years of academic experience, he served as faculty member at the Univ. of South Alabama, Jackson State Univ., Polytechnic Univ., Fort Hays State Univ., Florida Polytechnic Univ., Dakota State Univ., Univ. of South Carolina
Skills and Expertise
Additional affiliations
August 2012 - August 2016
Education
August 2000 - August 2002
September 1998 - May 2000
September 1995 - July 1998
Publications
Publications (94)
As security begins to shift to a global priority, it is important to note the changing threat landscape and potential abuse scenarios that may propagate from emerging technologies. With each new technology there coincides threats and challenges that have not yet been discovered or answered. With the unprecedented growth that is being realized for t...
كانت نشأة الإسلام منذ أكثر من أربعة عشر قرناً حدثاً هائلاً في تاريخ البشرية وكان له تأثير دائم على الإنسانية. لعدة قرون، كتب الباحثون في نمو وتوزيع المسلمين في جميع أنحاء العالم. الغرض من هذه الدراسة هو تقديم تقدير موثق لعدد السكان المسلمين في العالم منذ ظهور الإسلام في بداية القرن السابع ميلادي حتى نهاية القرن الحادي والعشرين. في هذا الكتاب، نقسم...
Advances in data analytics have made data valuable in getting business intelligence about sales, marketing and customer service. Enterprises are increasingly collecting and storing more and more data about customers and their behavior. Consequently, data breaches have evolved drastically in recent years and have become one of the key challenges fac...
Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to...
The birth of Islam over fourteen centuries ago was a monumental event in human history with an everlasting effect on humanity. For centuries, researchers have contemplated on the growth and distribution of Muslims throughout the world. This book presents a reliable estimate of the world Muslim population since the inception of Islam at the start of...
Mapping data gathered by governments, corporations, and private individuals can be published freely across the web for use in diverse application sets. Upon its collection, other data, private data, may become subject to the public eye. Evolving from multiple acquisitions in its almost twenty-year history, Google's Street View application offers th...
Organizations today gather unprecedented quantities of data from their operations. This data is coming from transactions made by a person or from a connected gadget.
From personal devices to industry including government, the internet has become the primary means of modern communication, further increasing the need for a method to
track and secure...
Considering emerging technologies and applications is an important step in assessing future security needs. For example, Advances in Internet of Things (IoT) and Autonomous Systems have presented new cyber security challenges. The severity of such cyber threats is magnified as societies are becoming more and more dependent on such emerging technolo...
Personal vehicles are increasingly becoming smarter, safer and an extension of the wider Internet of Things (IoT) connected landscape. As manufactures continue to push the limits of automotive technology and engineering, they are increasingly missing foundational principles necessary to protect consumer privacy. The purpose of this paper is to expl...
A struggle has emerged in relation to the sacredness of one's private information and the importance of moving forward in a digital world of social media, smart devices, and Big Data-an era known as the Age of Context. The purpose of this paper is to make a clear case for concern regarding the seriousness of keeping data private while facilitating...
Multi-Factor Authentication (MFA) has been around for three decades and now authentication and security has taken priority in securing data. Cyber-attacks have become widely popular and successful because organizations are poorly prepared to handle cyber security operations. These organizations hold critical information about employees, customers a...
Millions of Americans wear a lifelong "badge of shame" as a consequence of a lapse in judgment leading to a criminal conviction, especially in the digital era. Currently, there is a variation in expungement laws across the states which can cause uncertainty for the ex-offender with regards to employment and leaves questions unanswered about disclos...
Advances in internet technologies continue enabling users across the globe access to information on-demand and at low cost. Taking advantage of this proliferation of information sharing is transforming how individuals learn and develop new skills for use in everyday life. Open learning materials provide a unique opportunity to many life-long
learne...
Insider threats are a growing concern to both public and private entities. Like other threats within the cyber realm, these threats tend to be dynamic in nature. Organizational structures and varying motivating factors of threat actors can impact the effectiveness of mitigating technologies and strategies. This paper explores the gaps that result w...
Technology has grown rapidly since the end of the last century. Thousands of businesses from different major industries are transforming into information organizations and offering online services. The industrial and enterprise of Internet of Things (IoT) is growing at an exponential rate. Incident Command Systems (ICS) and Supervisory Control and...
The technological innovation of cyber systems and increase dependence of individuals, societies and nations on them has brought new, real and everchanging threat landscapes. In fact, the threats evolving faster than they can be assessed. The technological innovation that brought ease and efficiency to our lives, has been met by similar innovation t...
Botnets are a form of cyber threat responsible for massive Distributed Denial of Service (DDoS) attacks, delivery of malicious payloads like ransomware, and dissemination of spam which might be used for phishing. Botnets are closely associated with the Internet of Things (IoT), particularly IoT devices, which when compromised can become part of a b...
As the dynamics of cyber warfare continue to change, it is very important to be aware of the issues currently confronting cyberspace. One threat which continues to grow in the danger it poses to cyber security are botnets. Botnets can launch massive Distributed Denial of Service (DDoS) attacks against internet connected hosts anonymously, undertake...
Cyber threats and attacks have significantly increased in complexity and quantity throughout this past year. In this paper, the top fifteen cyber threats and trends are articulated in detail to provide awareness throughout the community and raising awareness. Specific attack vectors, mitigation techniques, kill chain and threat agents addressing Sm...
B u m a k a len in a m a cı 1950'd e n 2020 y ılın a k adar A m erik a k ıta sınd a k i h e r ü lk e için g ü v e n ilir b ir n ü fu s ta h m in i v e y ü z d e si sunm aktır. B u veri, A m erik a 'd a k i M ü slü m a n n ü fu sla ilg ili olarak y a p ıla n d iğ e r ça lışm a la ra v e ta rtışm a la ra b ir refera n s o lm a sı d ü ş ü n ce s iy le...
h la m ın 14 y ü z y ıl ö n c e d oğu şu , in sa n lık ta rih in d e sonsu za d ek sü recek etk iler bırak an a b id e v i b ir ola yd ır. A ra ştırm a cıla r yü z y ılla rd ır Isla m ın b ü y ü m e s i v e d ü n y a n ın d ö r t b ir y a n ın a y a y ılış ı ü z erin e k afa y o rm a k ta d ırla r B u m a k a len in a m a cı, O k ya n u sya v e...
The birth of Islam over fourteen centuries ago was a monumental event in human history with an everlasting effect on humanity. For centuries researchers contemplated on the growth and distribution of Muslims throughout the world. The purpose of this manuscript is to present a reliable estimate of the Muslim population in Western Europe since the in...
On dört asır önce İslamiyet'in doğuşu, tarihte devasa bir olay olarak hala insanlığı et kileyemeze devam etmektedir. Yüzyıllardır araş tırmacılar Müslümanların dünya yüzeyindeki dağılımları ve sayıları hakkında kafa yormak tadırlar. Bu makalenin amacı Afrika kıtasında yaşayan Müslüman Nüfusu hakkında günümüz siyasi sınırları içinde yirminci yüzy...
In the past thirty years, advances in high performance computing have increased the performance by million times, and decreased the volume of the machine by similar order. Accordingly, the fastest computer in the world increased its performance from one Gigaflop/s in mid-1980s to a projected one Exaflop/s by 2020. In addition, current hand-held dev...
The birth of Islam over fourteen centuries ago was a monumental event in human history with an everlasting effect on humanity. For centuries researchers contemplated on the growth and distribution of Muslims throughout the World. The purpose of this manuscript is to present a reliable estimate of the Muslim population in South America since the inc...
The birth of Islam over fourteen centuries ago was a monumental event in human history with an everlasting effect on humanity. For centuries researchers contemplated on the growth and distribution of Muslims throughout the World. The purpose of this manuscript is to present a reliable estimate of the World Muslim population since the inception of I...
A new model-testing paradigm is introduced. The proposed method uses the structure of the autocorrelation function of the model that we would like to fit the data to. We start by estimating the autocorrelation function of the data, and then apply a curve-fitting criterion, which we call the optimization method. If the resultant error is high, then...
There is a large amount of illegal content being replicated through peer-to-peer (P2P) networks where BitTorrent is dominant; therefore, a framework to profile and police it is needed. The goal of this work is to explore the behavior of initial seeds and highly active peers to develop techniques to correctly identify them. We intend to establish a...
This paper proposes a Multi-Level Sampling (MLS) approach for continuous Loss of Self-Similarity (LoSS) detection using iterative window. The method defines LoSS based on Second Order Self-Similarity (SOSS) statistical model. The Optimization Method (OM) is used to estimate self-similarity parameter since it is fast and more accurate in comparison...
Supercomputers are being used increasingly by scientists and engineers to process data intensive applications. System restore points (checkpoints) are used to restore a process at a previously saved state if a system component fails. When failures become too frequent, it is no longer feasible to make application progress with checkpoints. Proactive...
In this paper we consider MIMO system with Mt transmitting and Mr receiving antennas, when channel state information (CSI) is known on the transmitter side. In this case, the optimum multiple antenna transmission consists of allocating the transmitted power for each virtual sub-channel related to the corresponding eigenvalue of the propagation chan...
Density Functional Theory (DFT) provides the theoretical foundation for a self-consistent mean-field description of the nucleus in terms of one-body densities and currents. The idea is to construct a functional whose input is the proton and neutron densities and currents, and whose output yields the ground-state energy and other properties of the n...
The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells represent the occurrence of terms (words) within documents. This methodology is used to rank text documents, such as Web pages or abstracts, based on their relevance to a top...
The purpose of this manuscript is to present a reliable estimate in form of tables of the Muslim population and its percentage in each country in the Americas. This data is summarized to be a reference for other studies and discussions related to Muslim population. The data show that Muslim population in the Americas, both in size and in percentage...
In this paper MIMO ad hoc wireless network performance in terms of signal-to-interference-plus-noise-ratio (SINR) for two physical layers models is considered. We analyze and discuss the performance of MIMO spatial multiplexing with dominant eigenvalue transmission, when the the beamforming weights are chosen as 1) dominant eigenvector, and 2) adap...
The purpose of this manuscript is to present a reliable estimate in form of tables of the Muslim population and its percentage in each country in Europe. This data is summarized to be a reference for other studies and discussions related to Muslim population. The presented data show that about 7% of the population of Europe is Muslim, a total of ab...
The purpose of this manuscript is to present a reliable estimate of the Muslim population and its percentage in each country throughout the world. This data is summarized to be a reference for other studies and discussions related to Muslim population. The presented data show that Asia has 69% of the world Muslim population while Africa has 27%. In...
The purpose of this manuscript is to present a reliable estimate in form of tables of the Muslim population and its percentage in each country in Oceania. This data is summarized to be a reference for other studies and discussions related to Muslim population. The data show that Muslim population in Oceania, both in size and in percentage, remains...
The purpose of this manuscript is to present a reliable estimate in form of tables of the Muslim population and its percentage in each country in Asia. This data is summarized to be a reference for other studies and discussions related to Muslim population. The presented data show that nearly 28% of the population of Asia is Muslim, a total of abou...
Information Systems Security (ISS) has become increasingly an integral part of our lives. Accordingly, there is the need of increasing awareness of this issue in the society, increasing the workforce capable of meeting the corresponding challenges, and increasing the diversity of such workforce. Academic institutions are in the forefront of this ch...
Ranking text documents based on their relevance to a topic is of great importance in information retrieval. However, giving the increasingly available avalanche of digital documents, the size of collection pool from which these documents are drawn makes this task more challenging. In addition, current computing infrastructure is unable to deal with...
In this paper we consider MIMO system with Mt transmitting and Mr receiving antennas, when channel state information (CSI) is known on the transmitter side. The Reyleigh fading channel propagation condition is assumed. In this case, the optimum transmission consists of allocating the transmitted power for each virtual sub-channel related to the cor...
Numerous statistical data indicate that science and engineering workforce in the United States is aging and nearing retirement. Moreover, various studies show that it has become increasingly difficult to attract American students to science and engineering fields. We focus in this paper on a fast growing minority segment of the American population....
The purpose of this manuscript is to present a reliable estimate in form of tables of the Muslim population and its percentage in each country in Africa. This data is summarized to be a reference for other studies and discussions related to Muslim population. The presented data show that about 27% of the population of Africa is Muslim, a total of a...
This paper investigates loss of self-similarity (LoSS) detection performance using exact and asymptotic second order self-similarity (ESOSS and ASOSS) models. Previous works on LoSS detection have used ESOSS model with fixed sampling that we believe is insufficient to reveal LoSS detection efficiently. In this work, we study two variables known as...
This paper analyzes loss of self-similarity (LoSS) detection accuracy using parameterpsilas adjustment which includes different values of sampling level and correlation lag. This is important when considering exact and asymptotic self-similar models concurrently in the self-similarity parameter estimation method. Due to the needs of high accuracy a...
This paper proposes a continuous Loss of Self-Similarity (LoSS) detection using iterative window and Multi-Level Sampling (MLS) approach. The method defines LoSS based on Second Order Self-Similarity (SOSS) statistical model. The Optimization Method (OM) is used to estimate self-similarity parameter since it is fast and more accurate in comparison...
Ranking documents in a selected corpus plays an important role in information retrieval systems. Despite notable advances in this direction, with continuously accumulating text documents, maintaining up-to-date ordering among documents in the domains of interest is a challenging task. Conventional approaches can produce an ordering that is only val...
Motivated by the problem of cluster identification, we consider two multivariate normally distributed points. We seek to find the distribution of the squared Euclidean distance between these two point. Con- sequently, we find the corresponding distribution in the general case. We then reduce this distribution for special cases based on the mean and...
Recent studies have shown that malicious packets introduce distribution error and perturb the self-similarity property of network traffic. As a result loss of self-similarity (LoSS) is detected. Previous works on LoSS detection estimate the self-similarity parameter mostly at normal fixed sampling rate such as 10ms or 100ms. However, this is not su...
Recent studies have shown that malicious Internet traffic such as Denial of Service (DoS) packets introduces distribution error and perturbs the self-similarity property of network traffic. As a result, Loss of Self-Similarity (LoSS) is detected due to the abnormal traffic packets hence degrading the Quality of Service (QoS) performance. In order t...
The performance of network storage systems is often limited by overheads in the I/O path, such as memory copying, network access costs, and protocol overhead. As a result, I/O remains the bottleneck for high-performance data-intensive applications. This paper examines different communication transports and their effect on network storage system's p...
Summary Malicious traffic such as denial of service (DoS) attack has potential to introduce distribution error and perturbs the self- similarity property of network traffic. As a result, loss of self- similarity (LoSS) is detected which indicates poor quality of service (QoS) performance. In order to fulfill the demand for high speed and detection...
Recent studies have shown that malicious Internet traffic such as Denial of Service (DoS) packets introduces distribution error and perturbs the self-similarity property of network traffic. As a result, Loss of Self-Similarity (LoSS) is detected due to the abnormal traffic packets hence degrading the Quality of Service (QoS) performance. In order t...
This brief revisits the problem of conversion between number systems and asks the following question: given a nonnegative decimal number d, what is the value of the digit at position j in the corresponding base b number? Thus, we do not require the knowledge of other digits except the one we are interested in. Accordingly, we present a conversion f...
A new method to estimate the Hurst parameter of certain classes of random processes is presented. This method applies to Gaussian processes that are either exactly second-order self-similar or fractional ARIMA. The case of the former is of special interest because local area network traffic is well-known to be of this form. Confidence intervals and...
High-performance data-intensive applications demand reliable, high-performance storage that clients can depend on for data storage and delivery. While network storage systems have been successful in a variety of scenarios, they often do not satisfy all the requirements of today's computing environments. Accordingly, Emerging networking architecture...
In the literature, the probability density function (pdf) of a non-central ´2 distribution is represented using an infinite sum. In this paper, the case when the number of degrees of freedom " is odd is considered. Consequently, the corresponding pdf is represented as a finite sum of (" + 1)=2 terms only. I. I NTRODUCTION A non-central ´2 distribut...
In this paper, we consider the probability density function (pdf) of a non-central´2 distribution with odd number of degrees of freedom". This pdf is represented in the literature as an infinite sum. Conse- quently, we present three alternative expressions to this pdf. The first expression is in terms of a partial derivative of the hyperbolic cosin...
Unlike the classical deterministic digital circuit analysis, we consider the analysis of digital cir- cuits with uncertain inputs. Thus, given a bi- nary function of n uncertain input binary vari- ables, we introduce a new way of using K-maps to express the probability of this binary function in terms of the probabilities of the corresponding input...
of the Full Version of the Paper Unlike the classical deterministic digital circuit analysis, we consider a Monte Carlo simulation in the context of uncertain digital circuits. In other words, given a binary function of n uncertain input binary variables, we express the probability of this binary function in terms of the probabilities of the corre-...
The joint transform correlator (JTC) technique has been found to be suitable for real time pattern recognition applications. Among the various JTC techniques proposed in the literature, the fringe-adjusted JTC has been found to yield better correlation output for target detection. We propose a generalized fringe-adjusted JTC (GFJTC) based algorithm...
In this paper, we revisit the problem of conversion between number systems. We present a conversion function that relates each digit in a base b system to the decimal value that is equal to the base b number in question. Thus, each base b digit of the related base b number can be obtained directly from the corresponding decimal number without the r...
We consider the problem of converting a decimal number to a base b number. We present a conversion function that relates each digit in the base b system to the decimal value that is equal to the base b number in question. Thus, each base b digit of the related base b number can be obtained directly from the corresponding decimal number without the...
Unlike the classical deterministic digital circuit analysis, we consider the analysis of uncertain digital circuits defined as follows. Given a binary function of n uncertain input binary variables, we express the probability of this binary function in terms of the probabilities of the corre- sponding input binary variables. This in turn, allows us...
This paper presents the Network Storage Manager (NSM) developed in the Distributed Computing Laboratory at Jackson State University. NSM is designed as a Java-based, high-performance, distrib- uted storage system, which can be utilized in the Grid environment. NSM architecture presents a framework ofiering parallelism, scalability, crash recovery,...
The joint transform correlator (JTC) technique has been found to be suitable for real-time matching and tracking operations. Among the various JTC techniques proposed in the literature, the fringe-adjusted JTC has been found to yield better correlation output for target detection. In this paper, we propose a generalized fringe-adjusted JTC based al...
In this paper, several methods for estimating long-range dependence parameters have been proposed. By far, the wavelet method is the most widely used. When a process is assumed to be second-order self-similar, a new method was introduced that uses the structure of the covariance function to estimate the Hurst parameter. The method was shown to be m...
We present a new method to estimate the Hurst parameter of the increment process in network traffic -- a process that is assumed to be self-similar. The confidence intervals and biasedness are obtained for the estimates using the new method. This new method is then applied to pseudo-random data and to real traffic data. We compare the performance o...
This paper shows that the current methods for estimating the Hurst parameter in self-similar tra#c can lead to ambiguous and potentially incorrect results. Consequently, we propose a new method to estimate the Hurst parameter of the increment process in network tra#c, a process that is assumed to be second-order self-similar. We then apply our meth...
In this paper, we formulate and solve a new type of Monte Carlo
problem for a resistive network. Given lower and upper bounds on the
value of each resistor but no probability distribution, we consider the
problem of finding the expected value for a designated gain. In view of
the fact that no a priori probability distributions for the uncertain
res...