About
74
Publications
14,591
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
840
Citations
Introduction
Current institution
Additional affiliations
August 2014 - present
November 2006 - September 2009
Publications
Publications (74)
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image.
This study proposes an image encryption scheme bas...
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law, and plagiarism. This paper attempts to investigate source code authorship attribution by captur...
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed metho...
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size. The suggested approach will use a sophisticated private key with a convoluted structure. The private key will have 5 co...
Currently, almost all direct marketing activities take place virtually rather than in person, weakening interpersonal skills at an alarming pace. Furthermore, businesses have been striving to sense and foster the tendency of their clients to accept a marketing offer. The digital transformation and the increased virtual presence forced firms to seek...
Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an effective and safe method for storing digital colored images (CASDC). A high level of protection is pr...
Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an effective and safe method for storing digital colored images (CASDC). A high level of protection is pr...
Recently, spam on online social networks has attracted attention in the research and business world. Twitter has become the preferred medium to spread spam content. Many research efforts attempted to encounter social networks spam. Twitter brought extra challenges represented by the feature space size, and imbalanced data distributions. Usually, th...
Ranking and selecting the most fundamental classes in a software is a critical task for recognizing an inexperienced system. There are several approaches to detect these classes. This paper proposes a statistical-rank based approach that addresses an untouched area of testing coverage usefulness. Testing coverage information is used as new method t...
Software engineering project is the preferred mean to measure competency and practical skills among learners in IT-fields. This study investigates the opportunities to model software engineering project final evaluation and improve early prediction of academic software engineering project failure by considering female student participation as a tea...
Deliverable and course project become the preferred mean to measure learner competency and attainment of intended learning outcomes in IT-fields. Proper setup and evaluation for teamwork projects remains a key challenge for e-learning systems. This study investigates the possibility to improve the early prediction of academic software engineering p...
Featured Application
This study attempts to mitigate the effects of highly imbalanced data in realizing an enhanced cost-sensitive prediction model. The model intends to enable telemarketing decision makers in the banking industry to have more insights on their marketing efforts, such that potential clients gain more focus based on quantifiable cos...
Meteorological metrics have been used for weather forecasting and climate prediction. Remote sensing images proved to be a valuable resource to represent the terrain of earth’s surface. Recently, there has been extensive research to model changes on the earth’s landscape including water bodies using remote sensing images. Meanwhile, meteorological...
Meteorological metrics have been used for weather forecasting and climate prediction. Remote sensing images proved to be a valuable resource to represent the terrain of earth’s surface. Recently, there has been extensive research to model changes on the earth’s landscape including water bodies using remote sensing images. Mean- while, meteorologica...
JavaScript obfuscation is a deliberate act of making a script difficult to understand by concealing its purpose. The prevalent use of obfuscation techniques to hide malicious codes and to preserve copyrights of benign scripts resulted in (i) missing detection of malicious scripts that are obfuscated and (ii) raising false alarms due to the benign s...
JavaScript allows Web-developers to hide intention behind their code inside different looking scripts known as Obfuscated code. Automatic detection of obfuscated code is generally tackled from readability perspective. However, recently obfuscation exhibits patterns that modify both syntax and semantic characteristics while preserving readability ch...
This study attempts to optimize the prediction accuracy of the compressive strength of high-performance concrete (HPC) by comparing data-mining methods. Modeling the dynamics of HPC, which is a highly complex composite material, is extremely challenging. Concrete compressive strength is also a highly nonlinear function of ingredients. Several studi...
JavaScript code is often obfuscated; given such code, can we tell whether if it is malicious or benign? We propose Obfuscating Causal Relations Finding (OCRF), which addresses this problem. The contributions are the following: (1) careful feature extraction, using domain knowledge (2) no need for de-obfuscation, since our method can be applied to t...
In this work we focus on cloud-based malware detection. We investigate the existing academic and industry cloud-based malware detection solutions, and identify the drawbacks of those solutions. We also recommend a remedy for the drawbacks of those solutions. At the end we provide a summary of our proposed cloud-based anti-malware solution.
In this study we present our initial idea for using genetic algorithms to help a controllable mobile robot to find an optimal path between a starting and ending point in a grid environment. Themobile robot has to find the optimal path which reduces the number of steps to be taken between the starting point and the target ending point. GAs can overc...