About
29
Publications
23,546
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
180
Citations
Introduction
Current institution
Additional affiliations
January 2006 - June 2009
Publications
Publications (29)
Criminals employ steganography, a form of anti-forensics, to conceal information within other files, complicating the retrieval of original evidence in digital crimes and impeding investigations. Digital forensic analysts must employ appropriate tools to uncover hidden messages. This research aims to detect concealed files in digital evidence using...
The widespread usage of smartphones in many domains such as education, finance, organizations, and gaming makes hackers covet them and raises the challenge of facing cybercrime and forensic investigation of these devices. The devices run apps that can be sophisticatedly linked to other devices or platforms, or Web Apps, which duplicate the forensic...
The spread of different types of SSD memory in a wide range of devices increases the challenge of cybercrime and forensic investigation. This is due to the features of the memory structure and how the data is recovered under such features. This research paper consists of an experiment to recover permanently deleted files in SATAM.2 SSD memory when-...
IoT industry is growing rapidly worldwide. Therefore, the expansion in this industry has to be taken seriously as those IoT devices will take a huge part in our daily life. Presently, IoT devices are being used to create smart homes, automobiles, wearables, industrial Internet, and others. Devices of IoT are built to enhance user experience, invent...
Storage media has become more complex in structure. This matter has been observed during the past years and this was the result of the big expansion in the integrated circuits and electronics industry. Hard disk drives (HDDs) were traditionally used to store data. Solid-state drives (SSDs) are being used for the same purpose, but they can be repres...
Worldwide, enterprises and organizations are currently using advanced cyber security solutions and products to monitor and protect networks and data resources against cyber-attacks. However, there is another concern related to prevention of insider threats. For this reason, solutions such as users' behaviors monitoring and analysis are widely used...
Cyberbullies have taken advantage of the increase in social networks users and the emergence of new features that allow bullies to carry out their bullying without leaving any evidence. Therefore, it was necessary to define a framework that could be adopted by law enforcement agencies to preserve the evidence and prove the bullying in court. In thi...
ted: 07 March 2021; Published: 08 August 2021
Abstract: Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon...
COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, stu...
In this paper, we discuss phishing as one of the attack types used in social engineering. Phishing attacks will be discussed by simulating a process between two different devices in two different networks. An experimental penetration test was performed on one of the local network devices to obtain data and information of the victim. The experiment...
The rapid increase of cybercrimes and wide-ranging security measures has created an obvious need for deep understanding of security vulnerabilities for Cloud Computing environments, and for best practices addressing such vulnerabilities. Cybercrime activities have affected many regional and international organizational functions and operations. Fin...
The rapid increase of cybercrimes and wide-ranging security measures has created an obvious need for deep understanding of security vulnerabilities for Cloud Computing environments, and for best practices addressing such vulnerabilities. Cybercrime activities have affected many regional and international organizational functions and operations. Fin...
Due to the irrelevant patterns and noise of network data, most of network intrusion detection sensors suffer from the false alerts which the sensors produce. This condition gets worse when deploying intrusion detection measures in real-time environment. In addition, most of the existing IDS sensors consider all network packets features. Using all p...
Fuzzy cognitive maps (FCM) are ideal causal knowledge acquiring tools with fuzzy signed graphs which can be presented as an associative single layer neural network. Using FCM, our methodology attempt to diagnose and direct network traffic data based on its relevance to attack or normal connections. By quantifying the causal inference process, we ca...
Conventional knowledge acquisition methods such as semantic knowledge, production rules and question answering systems have
been addressed to a variety of typical knowledge based systems. However, very limited causal knowledge based methods have
been addressed to the problem of intrusion detection. In this paper, we propose an approach based on cau...
Most of the intrusion detection sensors suffer from the high rate of fake alerts that the sensor produce. In this paper, we propose a new approach based on fuzzy cognitive maps (FCM) to reduce false alerts in SOM-based intrusion detection sensors. Initially, each neuron is mapped to its best matching unit in the self organizing map and then updated...