Murad A. Rassam

Murad A. Rassam
  • PhD of Information Security
  • Professor (Associate) at Taiz University

About

61
Publications
29,229
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,454
Citations
Introduction
Murad A. Rassam works at the Department of Computer Networks and Distributed Systems- Faculty of Engineering and Information Technology, Taiz University. Murad is currently on a sabatical leave and works as an assistant professor in College of Computer, Qassim University, Buraidah, KSA. Murad does research in Network security, applied soft computing, Computer Security and Reliability and Computer Communications (Networks). Our current project is 'Efficient Anomaly Detection Model for Wireless Sensor Networks'.
Current institution
Taiz University
Current position
  • Professor (Associate)
Additional affiliations
March 2020 - present
Taiz University
Position
  • Professor (Associate)
April 2019 - present
Qassim University
Position
  • Professor (Assistant)
December 2006 - December 2016
Taiz University
Position
  • Professor (Assistant)
Education
October 2010 - June 2013
University of Technology Malaysia
Field of study
  • Information Security
December 2008 - April 2010
University of Technology Malaysia
Field of study
  • Network Security
September 2000 - September 2005
Latakia University
Field of study
  • Information Engineering (Computer Networks)

Publications

Publications (61)
Article
Full-text available
Global population aging creates distinct healthcare needs, particularly for older adults and those with serious illnesses. There are several gaps in current models for monitoring elderly individuals. These include the limited application of advanced deep learning techniques in elderly health monitoring, the lack of real-time anomaly detection for v...
Article
Full-text available
In medical healthcare services, Wireless Body Area Networks (WBANs) are enabler tools for tracking healthcare conditions by monitoring some critical vital signs of the human body. Healthcare providers and consultants use such collected data to assess the status of patients in intensive care units (ICU) at hospitals or elderly care facilities. Howev...
Article
Full-text available
An online social media platform such as Instagram has become a popular communication channel that millions of people are using today. However, this media also becomes an avenue where fake accounts are used to inflate the number of followers on a targeted account. Fake accounts tend to alter the concepts of popularity and influence on the Instagram...
Article
Full-text available
An intrusion detection system (IDS) is an effective tool for securing networks and a dependable technique for improving a user’s internet security. It informs the administration whenever strange conduct occurs. An IDS fundamentally depends on the classification of network packets as benign or attack. Moreover, IDSs can achieve better results when b...
Article
Full-text available
Deep learning (DL) models are frequently employed to extract valuable features from heterogeneous and high-dimensional healthcare data, which are used to keep track of patient well-being via healthcare monitoring systems. Essentially, the training and testing data for such models are collected by huge IoT devices that may contain noise (e.g., incor...
Chapter
Anomalous data detection is an important task for ensuring the quality of data in many real-world applications. Medical healthcare services are one such application where Wireless Body Area Networks (WBAN) is used to track human health situations. Such tracking is achieved by collecting and monitoring the basic physiological vital signs and making...
Article
Full-text available
The integration of the cloud and Internet of Things (IoT) technology has resulted in a significant rise in futuristic technology that ensures the long-term development of IoT applications, such as intelligent transportation, smart cities, smart healthcare, and other applications. The explosive growth of these technologies has contributed to a signi...
Article
Full-text available
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approach...
Article
Full-text available
Recently, malware has become more abundant and complex as the Internet has become more widely used in daily services. Achieving satisfactory accuracy in malware detection is a challenging task since malicious software exhibit non-relevant features when they change the performed behaviors as a result of their awareness of the analysis environments....
Article
Full-text available
As the Internet of Healthcare Things (IoHT) concept emerges today, Wireless Body Area Networks (WBAN) constitute one of the most prominent technologies for improving healthcare services. WBANs are made up of tiny devices that can effectively enhance patient quality of life by collecting and monitoring physiological data and sending it to healthcare...
Article
Full-text available
Social networks have become an integral part of our daily lives. With their rapid growth, our communication using these networks has only increased as well. Twitter is one of the most popular networks in the Middle East. Similar to other social media platforms, Twitter is vulnerable to spam accounts spreading malicious content. Arab countries are a...
Article
Full-text available
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as transportation, healthcare, and even education. IoT technology incorporates several tasks to achieve the goals for which it was developed through smart services. These services are intelligent activities that allow devices to interact with the physical world...
Article
Full-text available
Ransomware is an ill-famed malware that has received recognition because of its lethal and irrevocable effects on its victims. The irreparable loss caused due to ransomware requires the timely detection of these attacks. Several studies including surveys and reviews are conducted on the evolution, taxonomy, trends, threats, and countermeasures of r...
Article
Full-text available
Wireless Sensors Networks have been the focus of significant attention from research and development due to their applications of collecting data from various fields such as smart cities, power grids, transportation systems, medical sectors, military, and rural areas. Accurate and reliable measurements for insightful data analysis and decision-maki...
Cover Page
Full-text available
Yemen Research Organization organizes Webinar: How to Find A Research Topic and A Potential Supervisor Speaker: Dr. Murad Rassam Associate Professor of Network and Information Security Taiz University, Yemen Time: Saturday 30 October 2021 4:00 pm Sana'a Time Online Platform: ZOOM Join Zoom Meeting https://zoom.us/j/98553350585... Meeting ID:...
Article
Full-text available
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to us...
Conference Paper
A global health crisis is appeared due to the rapid transmission of the COVID-19 pandemic. According to the World Health Organization (WHO), one of the effective ways to decrease this transmission is wearing masks in crowded places. However, monitoring people by police is a weary and difficult process. Thanks to the improvement in technology and ar...
Article
Full-text available
As the use of the internet is growing exponentially, more and more businesses such as the financial sector are operationaliz-ing their services online. Consequently, financial frauds are increasing in number and forms around the world, which results in tremendous financial losses which make financial fraud a major problem. Unauthorized access and i...
Preprint
Full-text available
As the use of the internet is growing exponentially, more and more businesses such as the financial sector are operationalizing their services online. Consequently, financial frauds are increasing in number and forms around the world, which results in tremendous financial losses which make financial fraud a major problem. Unauthorized access and ir...
Conference Paper
Full-text available
Color is one of the most identifiable properties of objects and wide range of colors need to be detected. Images captured in RGB color space are hard to extract more than three colors from them due to their cubic shape of merging luminance, saturation, and color spectrum. This paper presents a color-based Object Categorization model that utilizes t...
Chapter
Full-text available
In this paper, a new model for voice morphing is proposed. The spectral characteristics of a source speaker’s speech have been transferred to speech as it was spoken by another designated target speaker. The proposed model performs a phoneme segmentation of the voice signal and then transforms the spectral characteristics of each segment using a Li...
Article
Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making...
Article
Full-text available
Most of Vehicular Ad Hoc Network’s (VANET) and Fly Ad Hoc Network (FANET) applications, protocols, and service rely on cooperativeness among network participants. Vehicles, could be unmanned aerial vehicles (e.g. drones), share their sensors’ information to improve network performance and provide safety, traffic efficiency, and entertainments. The...
Article
Full-text available
In this paper, an integrated academic accreditation program (named IAAP) is developed. The main focus of this study was engineering education, and a case study of the Faculty of Engineering and Information Technology at Taiz University (TU), Yemen was considered. The IAAP is developed by integrating two academic accreditation programs, the national...
Article
In vehicular ad hoc networks, vehicles need to exchange their recent mobility information at a high rate to maintain network agility and to preserve the performance of applications. Unfortunately, a high broadcasting rate affects the performance of both network reliability and information accuracy. The aim of this paper is to reduce the broadcastin...
Conference Paper
Full-text available
Availability of accurate and continuous positioning information is a fundamental requirement for Vehicular Ad Hoc Networks. However, existing positioning approaches does not fulfill the required accuracy of many VANET’s applications and services. Integrating GPS with vehicles’ kinematic information (GPS/DR) is widely suggested for vehicular positio...
Article
Full-text available
The application of wireless sensor networks (WSN) is increasing with the emergence of the 'Internet of Things' concept. Nonetheless, the sensed data quality and reliability are sometimes affected by factors such as sensor's faults, intrusions and unusual events among others. Consequently, the real time and effective detection mechanisms of anomalou...
Article
Full-text available
With the advances in sensor technology, sensor nodes, the tiny yet powerful device are used to collect data from the various domain. As the sensor nodes communicate continuously from the target areas to base station, hundreds of thousands of data are collected to be used for the decision making. Unfortunately, the big amount of unlabeled data colle...
Conference Paper
Full-text available
Vehicular ad hoc network (VANET) is the key enabler for future intelligent transportation systems' applications. Due to its high mobility, VANETs rely on the availability of accurate and reliable mobility information of the vehicles. However, misbehavior in mobility can lead to catastrophic results in both safety and traffic efficiency. Several dra...
Article
Accurate positioning is a key factor for enabling innovative applications to properly perform their tasks in various areas including: Intelligent Transportation Systems (ITS) and Vehicular Ad Hoc Network (VANET). Vehicle positioning accuracy depends heavily on positioning techniques and the measurements condition in its surroundings. Several approa...
Article
Full-text available
In vehicular networks, the exchange of mobility information is considered as the basis for many applications. The quality of this information affects applications and networks performance. False mobility information leads applications, network services and security services to make wrong decisions. Accordingly, many verification approaches were pro...
Chapter
Full-text available
Ganoderma boninense (G. boninense) is one of the critical palm oil diseases that have caused major loss in palm oil production, especially in Malaysia. Current detection methods are based on molecular and non-molecular approaches. Unfortunately, both are expensive and time consuming. Meanwhile, wireless sensor networks (WSNs) have been successfully...
Article
Full-text available
Vehicle Ad hoc Network (VANET) is an emerging and promising technology for the Intelligent Transportation System (ITS). VANET can help to increase safety and traffic efficiency in flexible and feasible way. However, disseminating incorrect information in VANET has wide range of implications effecting drivers’ behaviors and causing serious, and may...
Article
Full-text available
Wireless sensor networks (WSNs) are widely used in monitoring environmental and physical conditions, such as temperature, vibration, humidity, light and voltage. However, the high dimension of sensed data, especially in multivariate sensor applications, increases the power consumption in transmitting this data to the base station and hence shortens...
Article
Full-text available
Wireless sensor networks (WSNs) are increasingly used as platforms for collecting data from unattended environments and monitoring important events in phenomena. However, sensor data is affected by anomalies that occur due to various reasons, such as, node software or hardware failures, reading errors, unusual events, and malicious attacks. Therefo...
Article
Full-text available
Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. Anomalies caused by hardware and software errors, unusual events, and malicious attacks affect the integrity of data gathered by such networks. Therefore, anomaly detection process is a necessary step in building sensor network system...
Article
Full-text available
Wireless Sensor Networks (WSNs) are important and necessary platforms for the future as the concept “Internet of Things” has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that...
Article
Full-text available
Wireless sensor networks (WSNs) applications are growing rapidly in various fields such as environmental monitoring, health care management, and industry control. However, WSN's are characterized by constrained resources especially; energy which shortens their lifespan. One of the most important factors that cause a rapid drain of energy is radio c...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) have emerged as one of the hottest research areas in recent years. These networks use radio communications as a media for transmission which make them susceptible to different types of attacks. Sinkhole attack is considered as one of the severe attacks that is launched by a compromised node to attract the network tra...
Conference Paper
Full-text available
To ensure the quality of data collected by sensor networks, misbehavior in measurements should be detected efficiently and accurately in each sensor node before relying the data to the base station. In this paper, a novel anomaly detection model is proposed based on the lightweight One Class Principal Component Classifier for detecting anomalies in...
Article
Full-text available
Many Intrusion Detection approaches (IDS) have been developed in the literature. Signature based approaches for anomaly detection need to be updated with the latest signatures of unknown attacks and hence being impractical. Anomaly based approaches on the other hand, suffer from high false alarms as well as low detection rates and need labeled data...
Article
Full-text available
Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very...
Conference Paper
Full-text available
Wireless Sensor Networks (WSN) security issues are getting more attention by researchers due to deployment circumstances. They are usually deployed in unattended and harsh environments that make them susceptible for many kinds of attacks. Different security mechanisms have been proposed for WSN. Detection-based mechanisms are considered to be the s...
Article
Full-text available
Intrusion Detection Systems (IDS) are developed to be the defense against security threats. Current signature based IDS like firewalls and anti viruses, which rely on labeled training data, generally cannot detect novel attacks. The purpose of this study is to enhance the detection rate by reducing the network traffic features and to investigate th...
Article
Full-text available
Intrusion Detection Systems (IDS) are developed to be the defenseagainst security threats. Current signature based IDS like firewalls andanti viruses, which rely on labeled training data, generally cannot detectnovel attacks. The purpose of this study is to enhance the detection rateby reducing the network traffic features and to investigate the fe...
Article
Full-text available
Intrusion Detection Systems (IDS) are developed to be the defense against these security threats. Current signature based IDS like firewalls and anti viruses, which rely on labeled training data, generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly based IDS. Literature has shown that direction...

Questions

Questions (3)
Question
Call for Special Issue Contributions: Transfer Learning for Enhanced Predictive Maintenance in Industrial Applications. Journal: Recent Advances in Computer Science and Communications Guest Editor: Yusliza Yusoff Co-Guest Editors: Murad A. Rassam, Kai-Qing Zhou Submission Deadline: 16th February, 2025 We are excited to invite submissions for a special issue on "Transfer Learning for Enhanced Predictive Maintenance in Industrial Applications" in the Recent Advances in Computer Science and Communications journal. This special issue aims to highlight the innovative use of transfer learning to improve predictive maintenance (PdM) strategies across various industrial sectors. Submission site: https://www.eurekaselect.com/call-for-papers-detail/6480/specialissue
Question
For data scientist,
Can anybody explain in general the differences between Anomaly and Outlier?
Question
What is the theoretical difference between Information Security and Cyber Security?

Network

Cited By