Khaled Elleithy

Khaled Elleithy
University of Bridgeport · Department of Computer Science & Engineering

Ph.D.

About

447
Publications
299,061
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,219
Citations
Introduction
Dr. Elleithy is the Associate Vice President for Graduate Studies at the University of Bridgeport. He has research interests are in the areas of network security, mobile communications, and quantum computing. He has published more than three hundreds research papers in international journals and conferences. Dr. Elleithy is the editor / co-editor of 14 books published by Springer for advances in Systems, Computing Sciences and Software.

Publications

Publications (447)
Article
Full-text available
In WSNs, the most critical issue is energy consumption as sensor nodes have limited resources. The sensors collect data from the environment where they can fail due to variations in pressure, temperature, and electromagnetic noise. All these can result in misleading readings and measurements where a lot of energy is consumed. Therefore, data fusion...
Article
Full-text available
The applications of WSN can be quiet numerous. In applications like battlefield monitoring, grid power generation, health systems, sensors are deployed on large scale. During such deployment, energy efficiency must be proficient, which requires clustering, in the WSN architecture. Clustering architecture requires maintenance of sensor nodes due to...
Conference Paper
Full-text available
The aim of this paper is to detect Rogue Access Points (RAPs) that clone legitimate Access Points (APs) characteristics. A novel passive approach that takes advantage of the characteristics of physical layer fields via the Radiotap length is proposed. This approach is a general fingerprint, thus, it can be used for different purposes such as identi...
Conference Paper
Full-text available
the reported research in literature for message transformation by a third party does not provide the necessary efficiency and security against different attacks. The data transmitted through the computer network must be confidential and authenticated in advance. In this paper, we develop and improve security of the braided single stage quantum cryp...
Article
Full-text available
Electrocardiogram (ECG) gives essential information about different cardiac conditions of the human heart. Its analysis has been the main objective among the research community to detect and prevent life threatening cardiac circumstances. Traditional signal processing methods, machine learning and its subbranches, such as deep learning, are popular...
Article
Full-text available
With the introduction of the Convolutional Neural Network (CNN) and other classical algorithms, facial and object recognition have made significant progress. However, in a situation where there are few label examples or the environment is not ideal, such as lighting conditions, orientations, and so on, performance is disappointing. Various methods,...
Article
Full-text available
Android receives major attention from security practitioners and researchers due to the influx number of malicious applications. For the past twelve years, Android malicious applications have been grouped into families. In the research community, detecting new malware families is a challenge. As we investigate, most of the literature reviews focus...
Article
Full-text available
The vehicular ad hoc network (VANET) is a method through which Intelligent Transportation Systems (ITS) have become important for the benefit of daily life. Real-time detection of all forms of attacks, including hybrid DoS attacks in IEEE 802.11p, has become an urgent issue for VANET. This is due to sporadic real-time exchange of safety and road em...
Article
Full-text available
The vehicular ad hoc network (VANET) is a method through which Intelligent Transportation Systems (ITS) have become important for the benefit of daily life. Real-time detection of all forms of attacks, including hybrid DoS attacks in IEEE 802.11p, has become an urgent issue for VANET. This is due to sporadic real-time exchange of safety and road em...
Article
Full-text available
VANET (vehicular ad hoc network) has a main objective to improve driver safety and traffic efficiency. The intermittent exchange of real-time safety message delivery in VANET has become an urgent concern due to DoS (denial of service) and smart and normal intrusions (SNI) attacks. The intermittent communication of VANET generates huge amount of dat...
Preprint
Full-text available
VANET (vehicular ad hoc network) has a main objective to improve driver safety and traffic efficiency. The intermittent exchange of real-time safety message delivery in VANET has become an urgent concern due to DoS (denial of service) and smart and normal intrusions (SNI) attacks. The intermittent communication of VANET generates huge amount of dat...
Article
Wireless sensor and actor networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are open to failure. Failure of actor nodes degrades the network performance and may lead to network disjoint. Thus, fault tolera...
Article
Full-text available
Due to recent developments in hardware and software technologies for mobile phones, people depend on their smartphones more than ever before. Today, people conduct a variety of business, health, and financial transactions on their mobile devices. This trend has caused an influx of mobile applications that require users’ sensitive information. As th...
Article
Full-text available
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard...
Article
Full-text available
p class="Abstract"> A directed graph represents an accurate picture of course descriptions for online courses through computer-based implementation of various educational systems. E-learning and m-learning systems are modeled as a weighted, directed graph where each node represents a course unit. The Learning Path Graph (LPG) represents and describ...
Article
Full-text available
Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate layer between WSNs and the end user to resolve some limitations, but most of the existing middleware is unable to protect data from...
Article
Full-text available
Eye exam can be as efficacious as physical one in determining health concerns. Retina screening can be the very first clue to detecting a variety of hidden health issues including pre-diabetes and diabetes. Through the process of clinical diagnosis and prognosis; ophthalmologists rely heavily on the binary segmented version of retina fundus image;...
Conference Paper
Full-text available
Optic disc segmentation in retinal fundus images plays a critical rule in diagnosing a variety of pathologies and abnormalities related to eye retina. Most of the abnormalities that are related to optic disc lead to structural changes in the inner and outer zones of optic disc. Optic disc segmentation on the level of whole retina image degrades the...
Poster
Our research currently focusing on image sensors predominantly the sensors implemented using CMOS (Complementary Metal Oxide Semiconductor) technology. These sensors designated as CMOS sensors which were introduced after CCD (Charge-coupled Devices) sensors since CCDs having some drawbacks in terms of its power and making cost compared to CMOS sens...
Conference Paper
Full-text available
Wireless Sensor and Actor Networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are variable to failure. Failure of actor nodes degrades the network performance and may leads to network disjoint. Thus, Fault t...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) are deployed in many applications such as those used in monitoring, by the military, in healthcare, etc. Since these applications deal with the transfer of sensitive data, they need protection from various attacks and intrusions. From the current literature, we observed that existing security algorithms are not suita...
Conference Paper
Full-text available
Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate layer between WSNs and the end user to resolve some limitations, but most of the existing middleware is unable to protect data from...
Article
Full-text available
The world has approximately 253 million visually impaired (VI) people according to a report by the World Health Organization (WHO) in 2014. Thirty-six million people are estimated to be blind. According to WHO, 217 million people are estimated to have moderate to severe visual impairment. An important factor that motivated this research is the fact...
Poster
Full-text available
Eye exam can be as efficacious as physical one in determining health concerns. Retina screening can be the very first clue to detecting a variety of hidden health issues including pre-diabetes and diabetes. Through the process of clinical diagnosis and prognosis; ophthalmologists rely heavily on the binary segmented version of retina fundus image;...
Article
Full-text available
Retinal vessels identification and localization aim to separate the different retinal vasculature structure tissues, either wide or narrow ones, from the fundus image background and other retinal anatomical structures such as optic disc, macula, and abnormal lesions. Retinal vessels identification studies are attracting more and more attention in r...
Article
Full-text available
Explosion phenomena today are considered a significant concern that needs to be detected and analyzed with a prompt response. We develop a multiclass categorization system for explosion phenomena using color images. Consequently, we describe four patterns of explosion phenomena including: pyroclastic density currents, lava fountains, lava and tephr...
Article
Full-text available
In this paper, we propose an efficient and deterministic quantum key distribution protocol for establishing a secret key between two untrusted users. In this protocol, a secret key is distributed to a sender and a receiver who share entangled states with a third trusted party but not with each other. This secret key is distributed by means of speci...
Conference Paper
Full-text available
Epilepsy is a neurological disease that is referred to as a disorder of the central nervous system characterized by the loss of consciousness and convulsions. Epileptic patients are subject to epileptic seizures caused by abnormal electrical discharges that lead to uncountable movements, convulsions and the loss of consciousness. Approximately 50 m...
Conference Paper
Full-text available
Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can...
Conference Paper
Full-text available
This paper discusses one of the most troublesome and frustrating issues for mobile devices users, battery life. Once a battery is utilized in a system, battery charging must be incorporated seamlessly so that the workflow of the user is uninterrupted. In today's fast-paced society, people don't have the time to stop what they are doing to charge th...
Conference Paper
Full-text available
Automated epilepsy seizure detection is the solution to the limitation and time consuming of manual epilepsy monitoring and detection using EEG signals. In this paper we developed a technique for epilepsy seizure detection using EEG signals. The signal will be pre-processed and filtered using multiple filters. Then, the filtered signal will be deco...
Article
Full-text available
Full paper: http://rdcu.be/mulz .... In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter, e.g., text, audio,...
Article
Full-text available
Quantum key distribution (QKD) is an innovative solution in the cryptography world to prevent the information leakage that can sometimes be deliberate. Several QKD protocols were recently presented for building a secure shared key, of which the BB84 protocol is one of those interesting protocols. The authentication between the communicating parties...
Article
Full-text available
Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the...
Article
Full-text available
In this paper, we present a conceptual framework for using the Semantic Web to get student data from other educational institutions, enabling the educational institutions to communicate and exchange student data. Educational institutions could then use this information to adjust the students' profiles and modify their learning paths. Semantic Web w...
Article
Full-text available
The need for a proper design and implementation of adequate surveillance system for detecting and categorizing explosion phenomena is nowadays rising as a part of the development planning for risk reduction processes including mitigation and preparedness. In this context, we introduce state-of-the-art explosions classification using pattern recogni...
Article
Full-text available
The actor nodes are the spine of wireless sensor and actor networks (WSANs) that collaborate to perform a specific task in an unverified and uneven environment. Thus, there is a possibility of high failure rate in such unfriendly scenarios due to several factors such as power consumption of devices, electronic circuit failure, software errors in no...
Article
Full-text available
The actor nodes are the spine of wireless sensor and actor networks (WSANs) that collaborate to perform a specific task in an unverified and uneven environment. Thus, there is a possibility of high failure rate in such unfriendly scenarios due to several factors such as power consumption of devices, electronic circuit failure, software errors in no...
Article
Full-text available
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issu...
Article
Full-text available
Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take i...
Conference Paper
Full-text available
Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganography method relies on the imperceptibility, embedding capacity, and robustness against attacks. This dissertation provides solutions for the existing video steganography problems...
Article
Full-text available
There has been a remarkable growth in many different real-time systems in the area of autonomous mobile robots. This paper focuses on the collaboration of efficient multi-sensor systems to create new optimal motion planning for mobile robots. A proposed algorithm is used based on a new model to produce the shortest and most energy-efficient path fr...
Article
Full-text available
The World Health Organization (WHO) reported that there are 285 million visually-impaired people worldwide. Among these individuals, there are 39 million who are totally blind. There have been several systems designed to support visually-impaired people and to improve the quality of their lives. Unfortunately, most of these systems are limited in t...
Article
Full-text available
Security is a major threat in Wireless Sensor Networks (WSNs). These networks are increasingly used due to their broad range of important applications in both military and civilian domains. The WSNs are prone to several types of security attacks. Limited power and low memory are obstacles that make conventional security measures inappropriate for W...
Book
Full-text available
2016 Annual Connecticut Conference on Industrial Electronics, Technology & Automation (CT-IETA)