
Noora FetaisQatar University · KINDI Center for Computing Research
Noora Fetais
PhD
About
55
Publications
9,635
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
427
Citations
Citations since 2017
Additional affiliations
January 2017 - present
November 2013 - present
April 2007 - November 2013
Publications
Publications (55)
The Uniaxial Compressive Strength (UCS) is an essential parameter in various fields (e.g., civil engineering, geotechnical engineering, mechanical engineering, and material sciences). Indeed, the determination of UCS in carbonate rocks allows evaluation of its economic value. The relationship between UCS and numerous physical and mechanical paramet...
Green cybersecurity is the emerging trend in the new era and this green cybersecurity technology minimizes the negative effects of IT operations and implements a green sustainable environment. Therefore, the study conceptually draws the concept of green cybersecurity by applying the theory of reasoned action (TRA) assumptions that logically support...
Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and understanding intricate details of complex security policies. However, current tools are not developed based on the actual needs...
Interactive data visualization tools for residential energy data are instrumental indicators for analyzing end user behavior. These visualizations can be used as continuous home feedback systems and can be accessed from mobile devices using touch-based applications. Visualizations have to be carefully selected in order for them to partake in the be...
Cyberattacks are becoming more and more intense in the banking industry (Ryzhkova et al. 2020 Ryzhkova, M., E. Soboleva, A. Sazonova, and M. Chikov. 2020. Consumers’ perception of artificial intelligence in banking sector. In SHS Web of Conferences 80:1019. EDP Sciences. doi:10.1051/shsconf/20208001019.[Crossref] , [Google Scholar]). Banking indust...
The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain management. It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data shari...
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction level of a security requirement by deployed mechanisms is not very useful. Rather, it would be more effective if we could quantify...
Bitcoin is a virtual, decentralized currency based on Blockchain technology. Regardless of where you send Bitcoin, the greenhouse gas emissions stemming from these transactions are distributed around the world. Furthermore, with the increasing public and institutional interest in Bitcoin, the value, complexity of Bitcoin mining, Blockchain networks...
As the Internet of Things (IoT) is evolving, one of its rapidly developing components is the transformation of standard Vehicle Ad-hoc Networks (VANETs) into the Internet of Vehicles (IoV). Due to the exceptional progress in computation and communication technologies, the IoV has attracted the attention of researchers and commercial companies. Neve...
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users’ online behavior, activities, and even personal information are being tracke...
This paper conveys the importance of using suitable data visualizations for electrical energy consumption and the effect it carries on reducing said consumption. Data visualization tools construct an important pillar in energy micro-moments, i.e., the concept of providing the right information at the right time in the right way for a specific power...
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals’ history for security or analytical purposes. On the other hand, the autonomous execution of pre-defined rules establishes trust between parties involved in such applications and improves the effi...
The Electronic Health Records (EHR) sharing system
is the state of art for delivering healthcare. The tools within
the system can predict outcomes during the patient’s lifetime,
monitor how effective are treatments, track therapies and detect
human errors. For main industry stakeholders, the priority is to
ensure integrity and interoperability acro...
Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods for behavioral change. However, there is an expanse of opportunity to capitalize on evidence-based, technology-enabled energy...
Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and academia. In this paper, we propose a new distributed smart-contract based control approach of BESSs to enable collaborative and se...
A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts .
The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second n...
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Tree...
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those questions provide the necessary information for the security assessment and to implement effective countermeasures. In the clo...
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific risk evaluation approach that uses various security attributes of the cloud (e.g., vulnerability information, the probabili...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed in the past decade to thwart cyberattacks. Due to the diverse range of different MTD techniques, it is of paramount importanc...
Read more here: http://www.qscience.com/doi/abs/10.5339/qfarc.2018.ICTPD149
Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system by manually investigating the vast amounts of textual information captured in these logs. The activities that are performed by the...
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic management of their data. However, the different types of cyber attacks, as well as the different attack goals, create difficulties pr...
The amount of raw data related to electricity consumption is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. By this increase, managers will find difficulties in studying the data and keeping track of the consumption. Thus, taking actions and future planning will be a hard task and th...
Data related to electricity consumption is a global problem, particularly here in Qatar. Thus, a customized tool to analyze this data is made. The aim of this research is to present a new software, which would help the Qatar General Electricity & Water Corporation (KAHRAMAA) to identify trends, patterns and relationships of the consumptions and was...
An Intrusion Detection System (IDS) is used for monitoring computer security breaches by monitoring and analyzing the data recorded in log files. However, it is difficult to manually investigate the vast amounts of textual information captured in these logs. In this paper, we propose a framework for an IDS using an Information Visualization (IV) ap...
Notations develop over time. We propose that they characteristically pass through a series of development stages, starting very simple and becoming more complex, reaching a stage of complexity that hinders their usability: then, often, a new higher-level notation is developed that is once again simple, and will perhaps pass through the same develop...
Constraint diagrams [1, 2] constitute a graphical notation for program specification. This paper presents an experiment that
compares the efficacy of constraint diagrams (CD) with natural language (NL) for understanding program specification statements.
In a web-based competition 33 participants were given training either on CD notation or equivale...
This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis as a means to generate concept lattices. The system is based on a new breed of file systems called content-based file systems. T...
Projects
Project (1)