Shubair Abdulla

Shubair Abdulla
Sultan Qaboos University | SQU · Department of Instructional and Learning Technologies (ILT)

PhD

About

33
Publications
21,883
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
197
Citations
Citations since 2017
21 Research Items
155 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040

Publications

Publications (33)
Article
It is a serious problem that universities worldwide, especially in the middle east, have a high rate of failure in programming courses. To overcome this issue which could probably be due to students’ lack of engagement, motivation and problem-solving skills, the Intelligent Tutoring System (ITS) can be an effective tool for enhancing student learni...
Article
Full-text available
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field f...
Article
Full-text available
The task of literature review is an important for all research areas. The volume of academic literature published in the scientific journals, books and conference proceedings is increasing rapidly. It has become very difficult for researchers to analyze huge amount of published research papers and draw conclusions. Therefore, an automatic system ab...
Article
Full-text available
The educational data mining research attempts have contributed in developing policies to improve student learning in different levels of educational institutions. One of the common challenges to building accurate classification and prediction systems is the imbalanced distribution of classes in the data collected. This study investigates data-level...
Article
Full-text available
Assessment has always been fundamental to teaching as it aims to gauge the impact of the teaching on students learning. The current assessment in teaching computer literacy is objective assessment that focuses on making it intentional, informative, and formalized. Although this assessment is the best way when assessing large groups of students at o...
Article
Full-text available
IPv6 is the next Internet Protocol version designed to eventually replace IPv4 as the amount of potentially allocated IPv4 addresses is insufficient. The vulnerabilities of IPv6 protocols and the attacks against them demand more attention to be paid. The multicast mechanism is one of the crucial mechanisms that are related to the nature of IPv6 pro...
Article
Full-text available
This study is conducted to investigate experts’ views to determine the Omani higher education institutions readiness and deployment of IPv6. In particular, the study aims to assess the institutional awareness, current environment, policy, planning, and resources. Descriptive method was followed and two study instruments were designed and implemente...
Article
Full-text available
This study is conducted to investigate experts' views to determine the Omani higher education institutions readiness and deployment of IPv6. In particular, the study aims to assess the institutional awareness, current environment, policy, planning, and resources. Descriptive method was followed and two study instruments were designed and implemente...
Article
Full-text available
Detecting the denial of service attacks that solely target the router is a maximum security imperative in deploying IPv6 networks. The state-of-the-art Denial of Service detection methods aim at leveraging the advantages of flow statistical features and machine learning techniques. However, the detection performance is highly affected by the qualit...
Article
Full-text available
Classifying network packets is crucial in intrusion detection. As intrusion detection systems are the primary defense of the infrastructure of networks, they need to adapt to the exponential increase in threats. Despite the fact that many machine learning techniques have been devised by researchers, this research area is still far from finding perf...
Article
Full-text available
It has been widely assumed by the research community that the network reconnaissance attacks in IPv6 networks are unfeasible because they would take tremendous effort to perform address scanning of 2⁶⁴ hosts in an IPv6 subnet. However, recent research has revealed feasibility of these attacks by investigating a number of native IPv6 networks. The r...
Article
Full-text available
This research introduces new pedagogical approach, the Virtual Flipped Classroom (VFC). The VFC is an integration of two concepts: Flipped Classroom and Virtual Classroom. It enables the teachers to teach and guide the students in applying the activities needed to achieve best learning levels. To investigate the effect of VFC, the researchers appli...
Article
Full-text available
This paper describes the first stage of an internal grant provided by the Sultan Qaboos University to conduct a research project exploring the actual readiness of Higher Education Institutions (HEIs) to adopt a national migration plan to IPv6. Document analysis was used to derive necessary data on steps taken by the Omani concerned authorities to p...
Conference Paper
It has been widely assumed by the research community that the network reconnaissance attacks in IPv6 networks are unfeasible because they would take tremendous effort to perform address scanning of 2 64 hosts in an IPv6 subnet. However, recent research has revealed feasibility of these attacks by investigating a number of native IPv6 networks. The...
Article
Full-text available
Monitoring and analyzing network traffic are very crucial in discriminating the malicious attack. As the network traffic is becoming big, heterogeneous, and very fast, traffic analysis could be considered as big data analytic task. Recent research in big data analytic filed has produced several novel large-scale data processing systems. However, th...
Article
Full-text available
Braille documents play undeniable crucial role in the daily lives of low vision and visually-impaired people in current information and Internet era. Braille documents and its characters need to be understandable by vision people as well to motivate bridging the communication gap between visuallyimpaired people and vision people in different profes...
Article
Full-text available
Spam emails are increasing continually and represent real threat to internet community. Email spammers use advanced software techniques to send millions of spam emails across the internet to distribute announcements of services and items to obtain commercial benefits. Spam detection became a challenge and most of the existing spam detection techniq...
Technical Report
Full-text available
On Friday May 12th 2017, a new fast-spreading ransomware appeared on the Internet, named “WannaCrypt”, “WannaCry”, “WannaCrypt0r”, “WCrypt”, or “WCRY”. The ransomware targeted Microsoft Windows operating system. Its appearance disputed the availability of different resources throughout the Internet, and while large enterprises made the news, small...
Article
Two reasons why IPv6 is the network protocol of the future, the amount of potentially allocated IPv4 addresses is insufficient and IPv4 does not support mobility. Several transition mechanisms have been developed to facilitate secure movement from IPv4 to IPv6. The tunnel scheme is the focus of the recent research efforts. However, the tunnel schem...
Article
Full-text available
Since Accumulated Grad-Point Average (AGPA) is crucial in the professional life of students, it is an interesting and challenging problem to create profiles for those students who are likely to graduate with low AGPA. Identifying this kind of students accurately will enable the university staff to help them improve their ability by providing them w...
Article
Full-text available
As the Android operating system has become a key target for malware authors, Android protection has become a thriving research area. Beside the proved importance of system permissions for malware analysis, there is a lot of overlapping in permissions between malware apps and goodware apps. The exploitation of them effectively in malware detection i...
Article
Educational Data Mining (EDM) is an emerging research area, in which techniques are applied for exploring data educational systems. Since Accumulated Grade Point Average (AGPA) is crucial in students’ professional lives, having data-driven profiles for the students who are likely to graduate with low AGPA is an interesting and challenging problem....
Article
Full-text available
Despite the recent emergence of research, creating an evolving fuzzy clustering method that intelligently copes with huge amount of data streams in the present high-speed networks involves a lot of difficulties. Several efforts have been devoted to enhance traditional clustering techniques into on-line evolving fuzzy able to learn and develop conti...
Article
Full-text available
Advising is a vital component of student academic success in college. This paper describes the design and creation of an electronic Student Academic Advising System (SAAS) to support conventional advising procedures. Use of this SAAS is intended to better guide students through educational process via the use of technology applications. In addition...
Article
Full-text available
This paper presents a new kNN-based evolving neuro-fuzzy inference system kENFIS. The main function of kENFIS is to detect computer worms which possess a constant threat to Internet and have caused a significant damage to business recently. However, kENFIS can be applied to solve complex real-world problems that demand fuzzy rule-based systems able...
Article
Full-text available
We present a worm detection system that leverages the reliability of IP-Flow and the effectiveness of learning machines. Typically, a host infected by a scanning or an email worm initiates a significant amount of traffic that does not rely on DNS to translate names into numeric IP addresses. Based on this fact, we capture and classify NetFlow recor...
Conference Paper
Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all encrypted payloads share the same invariant exploit code to ensure exploiting same vulnerability in same manner on all victims. This res...
Article
Full-text available
We present a worm warning system that leverages the reliability of IP-Flow and the effectiveness of machine learning techniques. Our system aims at setting an alarm in case a node is behaving maliciously. Typically, a host infected by a scanning or an email worm initiates a significant amount of traffic that does not rely on DNS to translate names...
Article
Full-text available
This paper describes a new segmentation algorithm for handwritten Arabic characters using Rotational Invariant Segments Features (RISF). The algorithm evaluates a large set of curved segments or strokes through the image of the input Arabic word or subword using a dynamic feature extraction technique then nominates a small optimal subset of cuts fo...

Questions

Questions (2)
Question
In the case of a lack of data, is it acceptable to use a synthetic dataset in data mining methodologies?
Question
I am looking for real-world dataset for IPv6 benign and malicious flows

Network

Cited By