
Marwan MahmoudKing Abdulaziz University · Computer and Information Technology
Marwan Mahmoud
PhD
About
32
Publications
9,563
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
447
Citations
Citations since 2017
Introduction
Additional affiliations
January 2016 - present
May 2011 - December 2015
Publications
Publications (32)
Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has been demonstrated that the most efficient image encryption algorithms are based on Chaos. Previous research using chaos-based cryptosystems has resulted in poor performance when using a single computer...
Tourism has been one of the biggest competitive industries in the world. Nowadays, medical and wellness tourism are quickly developing as a part of tourism for health and wellness care. Social networking sites have played an important role in developing these types of tourism. Online reviews on the tourism products in social networking sites are co...
Internet of Things (IoT), an emerging technology, is becoming an essential part of today’s world. Machine learning (ML) algorithms play an important role in various applications of IoT. For decades, the location information has been extremely useful for humans to navigate both in outdoor and indoor environments. Wi-Fi access point-based indoor posi...
Software defect prediction (SDP) in the initial period of the software development life cycle (SDLC) remains a critical and important assignment. SDP is essentially studied during few last decades as it leads to assure the quality of software systems. The quick forecast of defective or imperfect artifacts in software development may serve the devel...
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of...
This study proposes an approach based on machine learning to forecast currency exchange rates by applying sentiment analysis to messages on Twitter (called tweets). A dataset of the exchange rates between the United States Dollar (USD) and the Pakistani Rupee (PKR) was formed by collecting information from a forex website as well as a collection of...
Security is a significant issue in software systems. The initially secure design of a software system could be at risk of a refactoring transformation. Consequently, via a refactoring transformation, the software could be considered vulnerable, and the refactoring process can undergo security-aware refactoring. This work deals with three security a...
With the development of wireless technology, two basic wireless network models that are commonly used, known as infrastructure and wireless ad hoc networks (WANETs), have been developed. In the literature, it has been observed that channel contention is one of the main reasons for packet drop in WANETs. To handle this problem, this paper presents a...
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. More...
Teaching learning based optimization (TLBO) algorithm is a distinguished nature-inspired population-based meta-heuristic, which is basically designed for unconstrained optimization. TLBO mimics teaching learning process through which learners acquire knowledge from their teachers, and improve their results/grades, accordingly. Stochastic ranking (S...
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers. Forwarding information professionally in a VANET is considered a challenging task precisely at the intersections where forwarding the information turns out...
Diseases can have a huge impact on the quality of life of the human population. Humans have always been in the quest to find strategies to avoid diseases that are life-threatening or affect the quality of life of humans. Effective use of resources available to human to control different diseases has always been critical. Researchers are recently mo...
Electric vehicles have significantly contributed to the sustainability of world economic growth. It is of critical importance to understand and examine the factors impacting the consumers’ attitude toward the adoption of electric vehicles. However, limited study investigated the effect of altruism on electric vehicles adoption from a pro-environmen...
Information-centric networking is the developing model envisioned by an increasing body of the data communication research community, which shifts the current network paradigm from host centric to data centric, well-known to information-centric networking (ICN). Further, the ICN adopts different types of architectures to extend the growth of the In...
Over the past decades, building manufacturing has caused serious environmental impacts, despite its role in the national economic growth. Thus, in developing strategic plans for economic growth, many governments consider the application of green manufacturing building and technologies as key factors towards a greener economy and lower carbon emissi...
One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs the law and order situations in a society but also affects the quality of lives of humans and makes them suppressed physically and emotionally and deprives them of enjoying life. The more the civilizations have advanced, the more the people are worki...
With the massive spike in the use of Online Social Network Sites (OSNSs) platforms such as Web 2.0, microblogs services and online blogs, etc., valuable information in the form of sentiment, thoughts, opinions, as well as epidemic outbreaks, etc. are transferred. With the OSNSs being widely accessible, this work aims at proposing a novel approach f...
In the history of human communication, the concept and need for secrecy between two parties has always been present. One way of achieving it is to modify the message so that it is readable only by the receiver, as in cryptography, for example. Hiding the message in an innocuous medium is called steganography whereas the counterpart of steganography...
This study presents a conceptual paper on developing a model of cyberterrorists’ rhetorical structure. The objectives of the study are to identify the type of rhetoric’s in cyber terrorists’ communication, analyze how the cyber terrorists utilize appeal to audience, stylistic devices and argumentation in their communication and to propose a model o...
The emergence of Blockchain have revolutionize the decentralization in distributed architecture. The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. These technologies allow to have a distributed peer-to-peer network in which each external entity c...
The fact that each technological concept comes from the advances in the research and development, Internet of Things (IoT) grows and touches virtually every area of human activities. This has yielded the possibility of analyzing various types of sensors-environment from any kind of IoT platform. The existing IoT platforms focuses more on the area r...
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were proposed as a new method of exchanging smart energy and a new method of exchanging smart energy. The main goal of this paper is to d...
The Internet of Things (IoT) smart city initiative has transformed technology spectrum into its new era of development. The increasing amount of data generated by millions of IoT devices and the rapid flow of data across distributed IoT devices are transmitting to remotely located cloud infrastructure over the Internet. Unfortunately, these large a...
Cloud-based services have become part of our day-to-day software solutions. The identity authentication process is considered to be the main gateway to these services. As such, these gates have become increasingly susceptible to aggressive attackers, who may use Denial of Service (DoS) attacks to close these gates permanently. There are a number of...
OAuth 2.0 is one of the protocols that are most commonly implemented as an authorization framework currently. This is because it has many advantages, one of which is its ability to be flexibly implemented on different systems and for different purposes. This work evaluates the implementation of Google's OAuth 2.0 for web server applications. This e...
Cloud-based services have become part of our day-to-day software solutions. The identity authentication process is considered to be the main gateway to these services. As such, these gates have become increasingly susceptible to aggressive attackers, who may use Denial of Service (DoS) attacks to close these gates permanently. There are a number of...
Safety and reliability are important in the cloud computing environment. This
is especially true today as distributed denial-of-service (DDoS) attacks
constitute one of the largest threats faced by Internet users and cloud
computing services. DDoS attacks target the resources of these services,
lowering their ability to provide optimum usage of the...
The Denial-of-service (DoS) attack is considered one of the largest threats to the availability of cloud-computing services. Due to the unique architecture of cloud-computing systems, the methods for detecting and preventing DoS attacks are quite different from those used in traditional network systems. A main target for DoS attackers is the authen...
Projects
Projects (2)
The main aim of this project is to share CFP and contribute in the field of networks, information security, and machine learning with friends, colleagues, and collaborators.