Marwan Mahmoud

Marwan Mahmoud
King Abdulaziz University · Computer and Information Technology

PhD

About

32
Publications
9,563
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
447
Citations
Citations since 2017
28 Research Items
420 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Additional affiliations
January 2016 - present
King Abdulaziz University
Position
  • Professor (Assistant)
May 2011 - December 2015
The University of Western Ontario
Position
  • Research and Teaching Assistant

Publications

Publications (32)
Article
Full-text available
Image encryption algorithms based on Chaotic approach are becoming increasingly popular for remotely sensed images using parallel techniques. It has been demonstrated that the most efficient image encryption algorithms are based on Chaos. Previous research using chaos-based cryptosystems has resulted in poor performance when using a single computer...
Article
Tourism has been one of the biggest competitive industries in the world. Nowadays, medical and wellness tourism are quickly developing as a part of tourism for health and wellness care. Social networking sites have played an important role in developing these types of tourism. Online reviews on the tourism products in social networking sites are co...
Article
Full-text available
Internet of Things (IoT), an emerging technology, is becoming an essential part of today’s world. Machine learning (ML) algorithms play an important role in various applications of IoT. For decades, the location information has been extremely useful for humans to navigate both in outdoor and indoor environments. Wi-Fi access point-based indoor posi...
Article
Full-text available
Software defect prediction (SDP) in the initial period of the software development life cycle (SDLC) remains a critical and important assignment. SDP is essentially studied during few last decades as it leads to assure the quality of software systems. The quick forecast of defective or imperfect artifacts in software development may serve the devel...
Article
Full-text available
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of...
Article
Full-text available
This study proposes an approach based on machine learning to forecast currency exchange rates by applying sentiment analysis to messages on Twitter (called tweets). A dataset of the exchange rates between the United States Dollar (USD) and the Pakistani Rupee (PKR) was formed by collecting information from a forex website as well as a collection of...
Article
Full-text available
Security is a significant issue in software systems. The initially secure design of a software system could be at risk of a refactoring transformation. Consequently, via a refactoring transformation, the software could be considered vulnerable, and the refactoring process can undergo security-aware refactoring. This work deals with three security a...
Article
Full-text available
With the development of wireless technology, two basic wireless network models that are commonly used, known as infrastructure and wireless ad hoc networks (WANETs), have been developed. In the literature, it has been observed that channel contention is one of the main reasons for packet drop in WANETs. To handle this problem, this paper presents a...
Article
Full-text available
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. More...
Article
Full-text available
Teaching learning based optimization (TLBO) algorithm is a distinguished nature-inspired population-based meta-heuristic, which is basically designed for unconstrained optimization. TLBO mimics teaching learning process through which learners acquire knowledge from their teachers, and improve their results/grades, accordingly. Stochastic ranking (S...
Article
Full-text available
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers. Forwarding information professionally in a VANET is considered a challenging task precisely at the intersections where forwarding the information turns out...
Article
Full-text available
Diseases can have a huge impact on the quality of life of the human population. Humans have always been in the quest to find strategies to avoid diseases that are life-threatening or affect the quality of life of humans. Effective use of resources available to human to control different diseases has always been critical. Researchers are recently mo...
Article
Electric vehicles have significantly contributed to the sustainability of world economic growth. It is of critical importance to understand and examine the factors impacting the consumers’ attitude toward the adoption of electric vehicles. However, limited study investigated the effect of altruism on electric vehicles adoption from a pro-environmen...
Article
Full-text available
Information-centric networking is the developing model envisioned by an increasing body of the data communication research community, which shifts the current network paradigm from host centric to data centric, well-known to information-centric networking (ICN). Further, the ICN adopts different types of architectures to extend the growth of the In...
Article
Over the past decades, building manufacturing has caused serious environmental impacts, despite its role in the national economic growth. Thus, in developing strategic plans for economic growth, many governments consider the application of green manufacturing building and technologies as key factors towards a greener economy and lower carbon emissi...
Article
Full-text available
One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs the law and order situations in a society but also affects the quality of lives of humans and makes them suppressed physically and emotionally and deprives them of enjoying life. The more the civilizations have advanced, the more the people are worki...
Article
Full-text available
With the massive spike in the use of Online Social Network Sites (OSNSs) platforms such as Web 2.0, microblogs services and online blogs, etc., valuable information in the form of sentiment, thoughts, opinions, as well as epidemic outbreaks, etc. are transferred. With the OSNSs being widely accessible, this work aims at proposing a novel approach f...
Chapter
In the history of human communication, the concept and need for secrecy between two parties has always been present. One way of achieving it is to modify the message so that it is readable only by the receiver, as in cryptography, for example. Hiding the message in an innocuous medium is called steganography whereas the counterpart of steganography...
Chapter
This study presents a conceptual paper on developing a model of cyberterrorists’ rhetorical structure. The objectives of the study are to identify the type of rhetoric’s in cyber terrorists’ communication, analyze how the cyber terrorists utilize appeal to audience, stylistic devices and argumentation in their communication and to propose a model o...
Article
Full-text available
The emergence of Blockchain have revolutionize the decentralization in distributed architecture. The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. These technologies allow to have a distributed peer-to-peer network in which each external entity c...
Article
Full-text available
The fact that each technological concept comes from the advances in the research and development, Internet of Things (IoT) grows and touches virtually every area of human activities. This has yielded the possibility of analyzing various types of sensors-environment from any kind of IoT platform. The existing IoT platforms focuses more on the area r...
Article
Full-text available
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were proposed as a new method of exchanging smart energy and a new method of exchanging smart energy. The main goal of this paper is to d...
Article
Full-text available
The Internet of Things (IoT) smart city initiative has transformed technology spectrum into its new era of development. The increasing amount of data generated by millions of IoT devices and the rapid flow of data across distributed IoT devices are transmitting to remotely located cloud infrastructure over the Internet. Unfortunately, these large a...
Article
Cloud-based services have become part of our day-to-day software solutions. The identity authentication process is considered to be the main gateway to these services. As such, these gates have become increasingly susceptible to aggressive attackers, who may use Denial of Service (DoS) attacks to close these gates permanently. There are a number of...
Conference Paper
OAuth 2.0 is one of the protocols that are most commonly implemented as an authorization framework currently. This is because it has many advantages, one of which is its ability to be flexibly implemented on different systems and for different purposes. This work evaluates the implementation of Google's OAuth 2.0 for web server applications. This e...
Article
Cloud-based services have become part of our day-to-day software solutions. The identity authentication process is considered to be the main gateway to these services. As such, these gates have become increasingly susceptible to aggressive attackers, who may use Denial of Service (DoS) attacks to close these gates permanently. There are a number of...
Conference Paper
Safety and reliability are important in the cloud computing environment. This is especially true today as distributed denial-of-service (DDoS) attacks constitute one of the largest threats faced by Internet users and cloud computing services. DDoS attacks target the resources of these services, lowering their ability to provide optimum usage of the...
Article
The Denial-of-service (DoS) attack is considered one of the largest threats to the availability of cloud-computing services. Due to the unique architecture of cloud-computing systems, the methods for detecting and preventing DoS attacks are quite different from those used in traditional network systems. A main target for DoS attackers is the authen...

Network

Cited By

Projects

Projects (2)
Project
The main aim of this project is to share CFP and contribute in the field of networks, information security, and machine learning with friends, colleagues, and collaborators.
Project
- Effective processing technique. - Processing data in secured environment.