Noora Fetais

Noora Fetais
Qatar University · KINDI Center for Computing Research

PhD

About

55
Publications
9,635
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
427
Citations
Citations since 2017
45 Research Items
425 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Additional affiliations
January 2017 - present
Qatar University
Position
  • Managing Director
November 2013 - present
Qatar University
Position
  • Professor (Assistant)
April 2007 - November 2013
Qatar University
Position
  • Lecturer

Publications

Publications (55)
Article
Full-text available
The Uniaxial Compressive Strength (UCS) is an essential parameter in various fields (e.g., civil engineering, geotechnical engineering, mechanical engineering, and material sciences). Indeed, the determination of UCS in carbonate rocks allows evaluation of its economic value. The relationship between UCS and numerous physical and mechanical paramet...
Article
Green cybersecurity is the emerging trend in the new era and this green cybersecurity technology minimizes the negative effects of IT operations and implements a green sustainable environment. Therefore, the study conceptually draws the concept of green cybersecurity by applying the theory of reasoned action (TRA) assumptions that logically support...
Article
Full-text available
Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and understanding intricate details of complex security policies. However, current tools are not developed based on the actual needs...
Article
Full-text available
Interactive data visualization tools for residential energy data are instrumental indicators for analyzing end user behavior. These visualizations can be used as continuous home feedback systems and can be accessed from mobile devices using touch-based applications. Visualizations have to be carefully selected in order for them to partake in the be...
Article
Full-text available
Cyberattacks are becoming more and more intense in the banking industry (Ryzhkova et al. 2020 Ryzhkova, M., E. Soboleva, A. Sazonova, and M. Chikov. 2020. Consumers’ perception of artificial intelligence in banking sector. In SHS Web of Conferences 80:1019. EDP Sciences. doi:10.1051/shsconf/20208001019.[Crossref] , [Google Scholar]). Banking indust...
Article
Full-text available
The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain management. It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data shari...
Article
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction level of a security requirement by deployed mechanisms is not very useful. Rather, it would be more effective if we could quantify...
Preprint
Full-text available
Bitcoin is a virtual, decentralized currency based on Blockchain technology. Regardless of where you send Bitcoin, the greenhouse gas emissions stemming from these transactions are distributed around the world. Furthermore, with the increasing public and institutional interest in Bitcoin, the value, complexity of Bitcoin mining, Blockchain networks...
Article
Full-text available
As the Internet of Things (IoT) is evolving, one of its rapidly developing components is the transformation of standard Vehicle Ad-hoc Networks (VANETs) into the Internet of Vehicles (IoV). Due to the exceptional progress in computation and communication technologies, the IoV has attracted the attention of researchers and commercial companies. Neve...
Article
Full-text available
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users’ online behavior, activities, and even personal information are being tracke...
Preprint
Full-text available
This paper conveys the importance of using suitable data visualizations for electrical energy consumption and the effect it carries on reducing said consumption. Data visualization tools construct an important pillar in energy micro-moments, i.e., the concept of providing the right information at the right time in the right way for a specific power...
Article
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals’ history for security or analytical purposes. On the other hand, the autonomous execution of pre-defined rules establishes trust between parties involved in such applications and improves the effi...
Conference Paper
Full-text available
The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient’s lifetime, monitor how effective are treatments, track therapies and detect human errors. For main industry stakeholders, the priority is to ensure integrity and interoperability acro...
Chapter
Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods for behavioral change. However, there is an expanse of opportunity to capitalize on evidence-based, technology-enabled energy...
Article
Full-text available
Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and academia. In this paper, we propose a new distributed smart-contract based control approach of BESSs to enable collaborative and se...
Patent
Full-text available
A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts . The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second n...
Preprint
Full-text available
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Tree...
Article
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those questions provide the necessary information for the security assessment and to implement effective countermeasures. In the clo...
Article
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific risk evaluation approach that uses various security attributes of the cloud (e.g., vulnerability information, the probabili...
Article
Full-text available
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed in the past decade to thwart cyberattacks. Due to the diverse range of different MTD techniques, it is of paramount importanc...
Poster
Read more here: http://www.qscience.com/doi/abs/10.5339/qfarc.2018.ICTPD149
Conference Paper
Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system by manually investigating the vast amounts of textual information captured in these logs. The activities that are performed by the...
Conference Paper
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic management of their data. However, the different types of cyber attacks, as well as the different attack goals, create difficulties pr...
Conference Paper
The amount of raw data related to electricity consumption is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. By this increase, managers will find difficulties in studying the data and keeping track of the consumption. Thus, taking actions and future planning will be a hard task and th...
Conference Paper
Data related to electricity consumption is a global problem, particularly here in Qatar. Thus, a customized tool to analyze this data is made. The aim of this research is to present a new software, which would help the Qatar General Electricity & Water Corporation (KAHRAMAA) to identify trends, patterns and relationships of the consumptions and was...
Article
An Intrusion Detection System (IDS) is used for monitoring computer security breaches by monitoring and analyzing the data recorded in log files. However, it is difficult to manually investigate the vast amounts of textual information captured in these logs. In this paper, we propose a framework for an IDS using an Information Visualization (IV) ap...
Conference Paper
Full-text available
Notations develop over time. We propose that they characteristically pass through a series of development stages, starting very simple and becoming more complex, reaching a stage of complexity that hinders their usability: then, often, a new higher-level notation is developed that is once again simple, and will perhaps pass through the same develop...
Conference Paper
Constraint diagrams [1, 2] constitute a graphical notation for program specification. This paper presents an experiment that compares the efficacy of constraint diagrams (CD) with natural language (NL) for understanding program specification statements. In a web-based competition 33 participants were given training either on CD notation or equivale...
Conference Paper
This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis as a means to generate concept lattices. The system is based on a new breed of file systems called content-based file systems. T...

Network

Cited By

Projects