
Manar Abu TalibUniversity of Sharjah | US · Department of Computer Science
Manar Abu Talib
Professor
About
91
Publications
34,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
732
Citations
Publications
Publications (91)
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Cancer is one of the most dangerous diseases to humans, and yet no permanent cure has been developed for it. Breast cancer is one of the most common cancer types. According to the National Breast Cancer Foundation, in 2020 alone, more than 276,000 new cases of invasive breast cancer and more than 48,000 non-invasive cases were diagnosed in the US....
Physiological measures, such as heart rate variability (HRV) and beats per minute (BPM), can be powerful health indicators of respiratory infections. HRV and BPM can be acquired through widely available wrist-worn biometric wearables and smartphones. Successive abnormal changes in these indicators could potentially be an early sign of respiratory i...
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs...
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil atta...
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detect...
Ever since unmanned aerial vehicles (UAV), also known as drones, became available for civilian use, their risks increased. Along with that, the need to control and monitor them increased rapidly. In the literature, many researchers explored different techniques and developed genuine and hybrid systems to counter UAVs. These systems are not only fou...
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role in this area. In this research paper, we conduct a Systematic Literature Review (SLR) which ana...
Blockchain is a revolutionary technology that allows data transactions to be made in a decentralized structure without having trusted central authorities. Governments have taken steps to unleash the potential of blockchain technology to explore the use of blockchain as critical infrastructure, create new business models, and transform government se...
With the advent of COVID-19 arose the need for social distancing measures, including the imposition of far-reaching lockdowns in many countries. The lockdown has wreaked havoc on many aspects of daily life, but education has been particularly hard hit by this unprecedented situation. The closure of educational institutions brought along many change...
Artificial intelligence (AI) and machine learning (ML) tools play a significant role in the recent evolution of smart systems. AI solutions are pushing towards a significant shift in many fields such as healthcare, autonomous airplanes and vehicles, security, marketing customer profiling and other diverse areas. One of the main challenges hindering...
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others. One of the results of Cloud development is the emergence of various security problems for both industry and consumer. One of the ways to secure Cloud is by using Machine...
Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Al...
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
This paper is a Systematic literature review on the topic of machine learning in object detection security, where the work done covers a number of 73 research papers related to this topic, and answers three different research questions, while providing charts, tables, and statistics to summarize the data and give the reader and easy to read summari...
The Internet of Things (IoT) system deals with a large amount of data generated by numerous sensors distributed over a vast geographical area. The goal of gathering such a massive amount of data is to create information. The optimum Information Quality (IQ) is critical for leveraging value from the IoT system. Although several studies have made var...
The waste management processes typically involve numerous technical, climatic, environmental, demographic, socio-economic, and legislative parameters. Such complex nonlinear processes are challenging to model, predict and optimize using conventional methods. Recently, artificial intelligence (AI) techniques have gained momentum in offering alternat...
Blockchain, a Distributed Ledger Technology, is a disruptive and revolutionary technology that enables transacting data in a decentralized structure without the need for trusted central authorities. Many industries have taken steps to unleash the potential of blockchain technology, including the government sector, and early adopters are exploring t...
Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introd...
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries — Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
Open source digital forensics tools are playing an important role for
forensics investigations. So, there is a need to assess these tools to ensure they meet users’ needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and...
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland!
The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries....
The emergence of technology associated with the Internet of Things (IoT) is reshaping our lives, while simultaneously raising many issues due to their low level of security, which attackers can exploit for malicious purposes. This research paper conducts a comprehensive analysis of previous studies on IoT device security with a focus on the various...
This paper addresses the problem related to the reliability of path after transmitting the given amount of data with the service level agreement (SLA) cooperation in the computer communication network (CCN). The links have associated with service performance factor (SPF) parameter during the data transmission and each node is associated with the re...
Recent developments in communication technologies, hardware and software are facilitating the implementation of different types of intelligent networks in various environments. One such network is the Internet-connected vehicles network. Internet of Vehicles (IoV) has recently become an active area of standardization, development and research, beca...
Blockchain technology is growing massively where the number of blockchain platforms and decentralized applications are increasing rapidly in the last years. However, most of the existing blockchain networks are operating in a standalone environment isolated from each other, which increases scalability and connectivity issues in the current blockcha...
A huge interest in astronomy has caused many astronomers and developers to collaborate to create software programs in this field. Open source software (OSS) is playing a vital and positive role in space activities and can make a substantial difference in many space software applications, including modeling and design tools, as well as in testing, g...
The increasing vulnerabilities found in Internet of Things (IoT) devices have raised the need for a solid mechanism of securing the firmware update of these connected objects, since firmware updates are one way to patch vulnerabilities and add security features. This survey analyses the types of attacks that target the firmware update operation in...
Open source software (OSS) is increasingly being integrated into educational institutions, and many countries require the use of OSS in government departments. However, not much focus is placed on integrating it into the educational sector in a strategic and productive manner. This paper examines the existing literature on the use of OSS in terms o...
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant thre...
Coronary Artery Disease (CAD) is one of the leading causes of death worldwide, and so it is very important to correctly diagnose patients with the disease. For medical diagnosis, machine learning is a useful tool, however features and algorithms must be carefully selected to get accurate classification. To this effect, three feature selection metho...
Internet of Vehicles (IoV) is the evolution of VANET (Vehicular Ad-hoc Networks) and Intelligent Transportation Systems (ITS) focused on reaping the benefits of data generated by various sensors within these networks. The IoV is further empowered by a centralized cloud and distributed fog-based infrastructure. The myriad amounts of data generated b...
Background
Open source digital forensics tools are playing an important role for law enforcement agency, security company operations, forensics investigations and enterprise security teams. There is a dire necessity to assess these software tools using quality in use models to ensure that they meet users' needs and adaptable to the context of use....
Blockchain is a key technology that has the potential to decentralize the way we store, share, and manage information and data. One of the more recent blockchain platforms that has emerged is Hyperledger Fabric, an open source, permissioned blockchain that was introduced by IBM, first as Hyperledger Fabric v0.6, and then more recently, in 2017, IBM...
Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer forensic tools to produce reliable results that meet legal requirements and are acceptable in the courts. Most of these tools are closed-source, making the software a black-box for testing pu...
A literature survey study was conducted to explore the state-of-the-art of open source software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries: Tunisia, Egypt, Jordan, Saudi Arabia, Qatar, Oman, and UAE. A framework and road map for OSS is derived and presented from interviews conducted i...
The UAE is one of the most technologically advanced countries in the Gulf region and the Middle East. IDC expects total IT spending in the UAE to increase at a compound annual growth rate of 6.0% over the fiveyear forecast period, reaching $8.06 billion in 2017. According to the latest survey by the World Economic Forum: The Global Information Tech...
Mathematical and statistical open source software (OSS) has played a vital and positive role in computing statistics, performing numerical computations, and solving for real and complex scalars. There is an enormous need to apply quality models to this type of software. In this paper, we present an inclusive set of current quality models and demons...
Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into assessing this type of tool. A Markov model is a robust means for analyzing and anticipating the functioning of an advanced component based system. It is used, for instance, to analyze the reliab...
A literature survey study was conducted to explore the state-of-the-art of Open Source Software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries - Tunisia, Egypt, Jordan, KSA, Qatar, Oman and UAE. A framework and road map for OSS is presented derived from interviews conducted in the UAE wit...
In this study, we focus on two objectives: (1) To raise awareness of the computing field in three groups of students-high school, freshmen in their first term of university (i.e., students taking the Introduction to IT course) and freshmen in their second term of university (i.e., students taking the Programming I course); and (2) to organize visib...
Researchers, practitioners and social scientists all agree on the enormous importance of social science research in advancing human knowledge and informing public policy makers. The National Research Foundation, along with other organizations in the UAE, is leading the initiative to integrate the efforts of social research institutions in order to...
Security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time period, due to recent advances such as high progress in cryptanalysis techniques, improvement of computing skills and continuous h...
Sheikh Zayed Al Nahyan, the UAE's founding father, has said, "Women have the right to work everywhere." Emirati Women play a vital role in family life, and they are part of the ongoing evolution of the UAE. The UAE is remarkable in having the highest rate, around 77%, of women in higher education in the entire world. They have proved that they atta...
H.H. Sheikh Khalifa Al-Nihayan, President of the UAE, considers entrepreneurs to be of vital importance to improving the economy of the UAE, as they constitute an institutionalized and systematic panel of qualified consultants. There is a real need for entrepreneurship in the UAE, as indicated in Abu Dhabi's Vision 2030 and Dubai's Strategic Plan 2...
In this paper we present our approach to revitalizing the introductory level programming course at Zayed University in the United Arab Emirates (UAE). This course has been re-designed to make computer programming fun and accessible to female students who sign up for the IT program with no background in computing and in particular analytical and pro...