Manar Abu Talib

Manar Abu Talib
University of Sharjah | US · Department of Computer Science

Professor

About

91
Publications
34,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
732
Citations

Publications

Publications (91)
Article
Full-text available
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Preprint
Full-text available
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Article
Full-text available
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer Foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Article
Full-text available
Physiological measures, such as heart rate variability (HRV) and beats per minute (BPM), can be powerful health indicators of respiratory infections. HRV and BPM can be acquired through widely available wrist-worn biometric wearables and smartphones. Successive abnormal changes in these indicators could potentially be an early sign of respiratory i...
Article
Full-text available
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs...
Article
Full-text available
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil atta...
Preprint
Full-text available
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Chapter
Ever since unmanned aerial vehicles (UAV), also known as drones, became available for civilian use, their risks increased. Along with that, the need to control and monitor them increased rapidly. In the literature, many researchers explored different techniques and developed genuine and hybrid systems to counter UAVs. These systems are not only fou...
Article
Full-text available
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role in this area. In this research paper, we conduct a Systematic Literature Review (SLR) which ana...
Chapter
Blockchain is a revolutionary technology that allows data transactions to be made in a decentralized structure without having trusted central authorities. Governments have taken steps to unleash the potential of blockchain technology to explore the use of blockchain as critical infrastructure, create new business models, and transform government se...
Article
With the advent of COVID-19 arose the need for social distancing measures, including the imposition of far-reaching lockdowns in many countries. The lockdown has wreaked havoc on many aspects of daily life, but education has been particularly hard hit by this unprecedented situation. The closure of educational institutions brought along many change...
Article
Full-text available
Artificial intelligence (AI) and machine learning (ML) tools play a significant role in the recent evolution of smart systems. AI solutions are pushing towards a significant shift in many fields such as healthcare, autonomous airplanes and vehicles, security, marketing customer profiling and other diverse areas. One of the main challenges hindering...
Article
Full-text available
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others. One of the results of Cloud development is the emergence of various security problems for both industry and consumer. One of the ways to secure Cloud is by using Machine...
Article
Full-text available
Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Al...
Chapter
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
Conference Paper
Full-text available
This paper is a Systematic literature review on the topic of machine learning in object detection security, where the work done covers a number of 73 research papers related to this topic, and answers three different research questions, while providing charts, tables, and statistics to summarize the data and give the reader and easy to read summari...
Article
The Internet of Things (IoT) system deals with a large amount of data generated by numerous sensors distributed over a vast geographical area. The goal of gathering such a massive amount of data is to create information. The optimum Information Quality (IQ) is critical for leveraging value from the IoT system. Although several studies have made var...
Article
The waste management processes typically involve numerous technical, climatic, environmental, demographic, socio-economic, and legislative parameters. Such complex nonlinear processes are challenging to model, predict and optimize using conventional methods. Recently, artificial intelligence (AI) techniques have gained momentum in offering alternat...
Article
Blockchain, a Distributed Ledger Technology, is a disruptive and revolutionary technology that enables transacting data in a decentralized structure without the need for trusted central authorities. Many industries have taken steps to unleash the potential of blockchain technology, including the government sector, and early adopters are exploring t...
Article
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
Chapter
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries — Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
Article
Full-text available
Open source digital forensics tools are playing an important role for forensics investigations. So, there is a need to assess these tools to ensure they meet users’ needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and...
Conference Paper
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries....
Article
The emergence of technology associated with the Internet of Things (IoT) is reshaping our lives, while simultaneously raising many issues due to their low level of security, which attackers can exploit for malicious purposes. This research paper conducts a comprehensive analysis of previous studies on IoT device security with a focus on the various...
Article
Full-text available
This paper addresses the problem related to the reliability of path after transmitting the given amount of data with the service level agreement (SLA) cooperation in the computer communication network (CCN). The links have associated with service performance factor (SPF) parameter during the data transmission and each node is associated with the re...
Article
Full-text available
Recent developments in communication technologies, hardware and software are facilitating the implementation of different types of intelligent networks in various environments. One such network is the Internet-connected vehicles network. Internet of Vehicles (IoV) has recently become an active area of standardization, development and research, beca...
Conference Paper
Blockchain technology is growing massively where the number of blockchain platforms and decentralized applications are increasing rapidly in the last years. However, most of the existing blockchain networks are operating in a standalone environment isolated from each other, which increases scalability and connectivity issues in the current blockcha...
Conference Paper
A huge interest in astronomy has caused many astronomers and developers to collaborate to create software programs in this field. Open source software (OSS) is playing a vital and positive role in space activities and can make a substantial difference in many space software applications, including modeling and design tools, as well as in testing, g...
Conference Paper
The increasing vulnerabilities found in Internet of Things (IoT) devices have raised the need for a solid mechanism of securing the firmware update of these connected objects, since firmware updates are one way to patch vulnerabilities and add security features. This survey analyses the types of attacks that target the firmware update operation in...
Article
Full-text available
Open source software (OSS) is increasingly being integrated into educational institutions, and many countries require the use of OSS in government departments. However, not much focus is placed on integrating it into the educational sector in a strategic and productive manner. This paper examines the existing literature on the use of OSS in terms o...
Article
Full-text available
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant thre...
Preprint
Full-text available
Coronary Artery Disease (CAD) is one of the leading causes of death worldwide, and so it is very important to correctly diagnose patients with the disease. For medical diagnosis, machine learning is a useful tool, however features and algorithms must be carefully selected to get accurate classification. To this effect, three feature selection metho...
Article
Full-text available
Internet of Vehicles (IoV) is the evolution of VANET (Vehicular Ad-hoc Networks) and Intelligent Transportation Systems (ITS) focused on reaping the benefits of data generated by various sensors within these networks. The IoV is further empowered by a centralized cloud and distributed fog-based infrastructure. The myriad amounts of data generated b...
Article
Full-text available
Background Open source digital forensics tools are playing an important role for law enforcement agency, security company operations, forensics investigations and enterprise security teams. There is a dire necessity to assess these software tools using quality in use models to ensure that they meet users' needs and adaptable to the context of use....
Article
Full-text available
Blockchain is a key technology that has the potential to decentralize the way we store, share, and manage information and data. One of the more recent blockchain platforms that has emerged is Hyperledger Fabric, an open source, permissioned blockchain that was introduced by IBM, first as Hyperledger Fabric v0.6, and then more recently, in 2017, IBM...
Article
Full-text available
Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer forensic tools to produce reliable results that meet legal requirements and are acceptable in the courts. Most of these tools are closed-source, making the software a black-box for testing pu...
Chapter
A literature survey study was conducted to explore the state-of-the-art of open source software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries: Tunisia, Egypt, Jordan, Saudi Arabia, Qatar, Oman, and UAE. A framework and road map for OSS is derived and presented from interviews conducted i...
Article
The UAE is one of the most technologically advanced countries in the Gulf region and the Middle East. IDC expects total IT spending in the UAE to increase at a compound annual growth rate of 6.0% over the fiveyear forecast period, reaching $8.06 billion in 2017. According to the latest survey by the World Economic Forum: The Global Information Tech...
Article
Mathematical and statistical open source software (OSS) has played a vital and positive role in computing statistics, performing numerical computations, and solving for real and complex scalars. There is an enormous need to apply quality models to this type of software. In this paper, we present an inclusive set of current quality models and demons...
Article
Full-text available
Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into assessing this type of tool. A Markov model is a robust means for analyzing and anticipating the functioning of an advanced component based system. It is used, for instance, to analyze the reliab...
Article
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries - Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
Article
Full-text available
In this study, we focus on two objectives: (1) To raise awareness of the computing field in three groups of students-high school, freshmen in their first term of university (i.e., students taking the Introduction to IT course) and freshmen in their second term of university (i.e., students taking the Programming I course); and (2) to organize visib...
Article
Researchers, practitioners and social scientists all agree on the enormous importance of social science research in advancing human knowledge and informing public policy makers. The National Research Foundation, along with other organizations in the UAE, is leading the initiative to integrate the efforts of social research institutions in order to...
Conference Paper
Full-text available
Security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time period, due to recent advances such as high progress in cryptanalysis techniques, improvement of computing skills and continuous h...
Article
Full-text available
Sheikh Zayed Al Nahyan, the UAE's founding father, has said, "Women have the right to work everywhere." Emirati Women play a vital role in family life, and they are part of the ongoing evolution of the UAE. The UAE is remarkable in having the highest rate, around 77%, of women in higher education in the entire world. They have proved that they atta...
Article
Full-text available
H.H. Sheikh Khalifa Al-Nihayan, President of the UAE, considers entrepreneurs to be of vital importance to improving the economy of the UAE, as they constitute an institutionalized and systematic panel of qualified consultants. There is a real need for entrepreneurship in the UAE, as indicated in Abu Dhabi's Vision 2030 and Dubai's Strategic Plan 2...
Article
In this paper we present our approach to revitalizing the introductory level programming course at Zayed University in the United Arab Emirates (UAE). This course has been re-designed to make computer programming fun and accessible to female students who sign up for the IT program with no background in computing and in particular analytical and pro...