Mamoun Alazab's research while affiliated with Charles Darwin University and other places

Publications (65)

Article
Full-text available
Globally, millions of people were affected by the Corona-virus disease-2019 (COVID-19) causing loads of deaths. Most COVID-19 affected people recover in a few spans of weeks. However, certain people even those with a milder variant of the disease persist in experiencing symptoms subsequent to their initial recuperation. Here, a novel Block-Chain (B...
Article
Full-text available
The emergence of the Internet of Things (IoT) has given digital communications a range of interconnected functionalities. The IoT is an intelligent technology between the real and the digital world. An IoT end-to-end solution comprises components such as Component for User Access: Mobile Application or Web Application. IoT Gateway. Cloud Infrastruc...
Article
Software similarity in different programming codes is a rapidly evolving field because of its numerous applications in software development, software cloning, software plagiarism, and software forensics. Currently, software researchers and developers search cross-language open-source repositories for similar applications for a variety of reasons, s...
Article
Sustainable energy management is an inexpensive approach for improved energy use. However, the research used does not focus on cutting-edge technology possibilities in an Internet of things (IoT). This paper includes the needs for today's distributed generation, households, and industries in proposing smart resource management deep learning model....
Article
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak evide...
Article
A large number of researchers recently focused on intelligent analysis about algorithms for path-finding concerning games. Currently, the most modern application in game map path-finding is based on the fuzzy logic (FL) algorithm. It demonstrates that these strategies increase the quest performance and have a simpler direction to enhance the algori...
Preprint
Full-text available
Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage soph...
Article
This work proposes a pattern recognition model for static gestures in Malaysian Sign Language (MSL) based on Machine Learning (ML) techniques. The proposed model is divided into two phases, namely, data acquisition and data processing. The first phase involves capturing the required sign data, such as the shape and orientation of the hand, to const...
Article
Under the times of the Industrial Internet of Things (IIoT), the traditional centralized machine learning management method can not deal with such a large number of data streams, and problem of data privacy has aroused widespread concern. In view of these difficulties, this paper uses the advantages of edge computing (EC) and federated learning (FL...
Article
Full-text available
Video surveillance devices are a valuable tool in various contexts to automate different danger conditions and enable security guards to make effective decisions to improve asset safety. This article suggests detecting and preventing criminal activities in shopping malls (DPCA-SM) framework that detects suspected activity in shopping malls in real-...
Article
Edge computing (EC) offers cloud-like services at the edge of mobile networks to satisfy the delay-sensitive and rapid computation applications in meeting the demands of rapidly increasing mobile devices and other IoTs. EC is known to be constrained with limited resources that its efficacy greatly depends on an effective and efficient resource allo...
Article
The explosive growth of road vehicles especially the private cars has brought unprecedented pressure to a series of problems in urban transportation systems, such as traffic congestion and environmental pollution. Private cars trajectory data and perceiving their information provide a promising solution to these problems. However, the collection of...
Article
Big data growth and the evolution of IoT technology figured prominently in making smart city projects feasible. The risk factors for big data in the smart city include data security, and privacy is considered an important factor. In this paper, machine learning-based holistic privacy decentralized framework (ML-HPDF) has been proposed to enhance pu...
Article
Full-text available
Context The vaccine distribution for the coronavirus disease of 2019 (COVID-19) is a multicriteria decision-making (MCDM) problem based on three issues, namely, identification of different distribution criteria, importance criteria and data variation. Thus, the Pythagorean fuzzy decision by opinion score method (PFDOSM) for prioritising vaccine rec...
Article
Full-text available
Owing to the limitations of Pythagorean fuzzy and intuitionistic fuzzy sets, scientists have developed a distinct and successive fuzzy set called the q-rung orthopair fuzzy set (q-ROFS), which eliminates restrictions encountered by decision-makers in multicriteria decision making (MCDM) methods and facilitates the representation of complex uncertai...
Article
Full-text available
The problem complexity of multi-criteria decision-making (MCDM) has been raised in the distribution of coronavirus disease 2019 (COVID-19) vaccines, which required solid and robust MCDM methods. Compared with other MCDM methods, the fuzzy-weighted zero-inconsistency (FWZIC) method and fuzzy decision by opinion score method (FDOSM) have demonstrated...
Preprint
Full-text available
The way e-commerce companies do commerce is transformed by cloud computing. Although the usage of cloud technology in e-commerce has grown suddenly, the advantages of cloud services platforms have not yet been exploited, especially for e-commerce applications. For decision-makers, it is vital that the optimized cloud-based computing solution like s...
Article
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Research Proposal
Full-text available
The proposed book focuses on the role and significance of Internet of Things (IoT) in the healthcare sector. IoT is going to impact the healthcare system in a big way. An IoT-based solution that include a network architecture that allows the connection between a patient and healthcare facilities is termed as the Internet of healthcare thing (IoHT)...
Article
The benchmarking of smart e‐tourism data management applications falls under the problem of multicriteria decision‐making (MCDM). This claim is supported by three issues: 12 smart key concepts need to be considered in the evaluation, criteria importance, and data variation among these criteria. Thus, an MCDM solution is essential to overcome proble...
Book
Full-text available
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social scienc...
Article
Vehicular Ad-Hoc Network (VANET) relies on momentary and stable infrastructure units for seamless connectivity. A stabilized connection in the network is required to aid uninterrupted service support regardless of the frequent displacement in the vehicle position. The implication of drones or flying ad-hoc networks in VANETs is common in smart citi...
Article
A new industrial revolution is emerging with the Internet of Things (IoT) growing use in enabling the machine to machine communication between the devices, sensors, actuators, and gateways. IoT lets the communication across devices and the network happen in real-time and helps make technologically smart homes, smart hospitals, and smart industrial...
Article
The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning framework...
Preprint
Full-text available
Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by collecting data from hostile environments like military and civil domains with limited resources. The above applications are prone to eavesdropper due to cryptographic algorithms' weaknesses for providing security in WSNs. The security protocols for WS...
Article
The disruptive shift of technologies in the Internet age poses the challenge of securing our digital asset and cyberspace from large-scale, sophisticatedly targeted offences and cybercrimes. As a response, many governments have introduced mandatory notification schemes in which an entity bears an obligation to notify the regulator and affected indi...
Book
Full-text available
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social scienc...
Article
With the tremendous growth of Information and Communications Technology (ICT), Cyber Physical Systems (CPS) have opened the door for many potential applications ranging from smart grids and smart cities to transportation, retail, public safety and networking, healthcare and industrial manufacturing. However, due to communication via public channel...
Article
Industrial Internet of Things is focused to improve the performance of smart factories through automation and scalable functions. IoT paradigm, information and communication technology, and intelligent computing are assimilated as a single entity for industrial automation, optimization, sharing and security, and scalability. In a view of the securi...
Article
Smart farming is a promising application area that relies on diverse intelligent and communication technologies to ease the outcome of the farming process. The multi-level processes in a farming scenario are automated through smart sensors and intelligent decision-making system. This article presents a smart sensor information processing method for...
Article
Internet of Medical Things (IoMT) platform serves as an interoperable medium for healthcare applications by connecting wearable sensors, end-users, and clinical diagnosis centers. This interoperable medium provides solutions for disease diagnosis; prediction and monitoring of end-user health using the physiological vital signs sensed wearable senso...
Chapter
Full-text available
The revolution of smart devices such as smartphones, smart washing machines, smart cars is increasing every year, as these devices are provided connected with the network and provide the online functionality and services available with the lowest cost. In this context, the Android operating system (OS) is very popular due to its openness. It has ma...
Article
AI and machine learning are revolutionary technologies being explored by the communication industry to integrate them into communication networks, provide modern services, improve network efficiency and user experience. The intrusion detection system is important for ensuring security of the industrial control system. Hence, in this paper, a machin...
Article
The significant growth of the Internet of Things (IoT) takes a key and active role in healthcare, smart homes, smart manufacturing, and wearable gadgets. Due to complexness and difficulty in processing multimedia data, the IoT based scheme, namely Internet of Multimedia Things (IoMT) exists that is specialized for services and applications based on...
Chapter
Full-text available
Part of the wider development and monitoring of smart environments for an intelligent cities approach is the building of an intelligent transportation system. Such a system involves the development of modern vehicles which significantly improve passenger safety and comfort, a trend that is expected to increase in the coming years. There are key fac...
Article
The rapid and convenient travel of people and the timely transportation of goods depend on the correct decision of the Intelligent Transportation Systems (ITS). Due to the decision-making of ITS requires a large amount of data to support, UAV-enabled periodic data collection is an effective method. However, due to the limited resources of UAV, UAV...
Article
Intelligent Transportation System (ITS) serves as the on-the wheel communication and service platform for the real-world driving users. Navigation service and traffic information flow among the connected vehicles relies on the available resources and infrastructure units. Appropriate sensing and selection of infrastructure units for seamless naviga...
Article
The smart city adopts information and communication technology (ICT), contributing to the growth, implementation, and advancement of sustainable development practices to address growing challenges to urbanization. The demanding factor in smart city applications is privacy, security, confidentiality, and authenticity, which are considered a prominen...
Article
This study evaluated the benchmarking process of active queue management (AQM) methods, which consider a multicriteria decision‐making (MCDM) problem using multidimensional criteria. Academic studies have benchmarked the AQM methods using MCDM techniques. However, these studies have used existing MCDM techniques, which face considerable theoretical...
Article
Patient authentication acquires superior attention as a necessary security requirement in a remote health monitoring system. From a usability perspective, credential-based authentication techniques that use sensors, such as orientation, finger and camera, are not exceedingly well-convenient for medical applications. Moreover, patients could entrust...
Article
In the era of Internet-of-Things (IoT), people access many applications through smartphones for controlling smart devices. Therefore, such a centralized node must follow a robust access control mechanism so that an intruder cannot control the connected devices. Recent reports suggest that password can be used as an authentication factor for accessi...
Article
The perceptual experience of next-generation wireless networks is nowadays coexisting with a unified heterogeneous system. It uses advanced IP features with scalable infrastructure to optimize the efficiency rate of the core networks. Of late, the Internet of Things (IoT) has played a significant role in the growth of smart devices that derive a fo...
Article
Ultrareliable and low-latency communication (URLLC) is a prerequisite for the successful implementation of the Internet of Controllable Things. In this article, we investigate the potential of deep reinforcement learning (DRL) for joint subcarrier-power allocation to achieve low latency and high reliability in a general form of device-to-device (D2...
Article
6G-enabled network in a box (NIB) is a multi- generational, rapidly deployable hardware and software technology for the communication. 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications of after disaster scenario batt...
Article
Full-text available
Agriculture is a vital area for the sustenance of mankind engulfing manufacturing, security, traceability, and sustainable resource management. With the resources receding expeditiously, it is of utmost significance to innovate techniques that help in the subsistence of agriculture. The growth of Internet of Things (IoT) and Blockchain technology a...
Article
In last few decades, many methods are proposed for time‐series forecasting. As always, when alternatives exists, choice needs to be made so that an appropriate forecasting method can be selected, and used for a specific forecasting. Primarily, the type of data used for time‐series forecasting are univariate and multivariate. In this paper, we prese...
Article
The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during communication either with the control room/ground station server(s) or moving access points in the sky, security and privacy is one the crucial issues which needs to be tackled efficiently. In this...
Article
Full-text available
Call for Papers-On the onset of a new era of global transformation in which residents and their surrounding environments are increasingly connected through rapidly-changing intelligent technologies. This transformation offers great promise for improved wellbeing and prosperity but poses significant challenges at the complex intersection of technolo...
Article
Unfortunately, both researchers and malware authors have demonstrated that malware scanners are limited and can be easily evaded by simple obfuscation techniques. This paper proposes a novel ensemble convolutional neural networks (CNNs) based architecture for effective detection of both packed and unpacked malware. We have named this method image-b...
Article
The volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware binary detection through image classification. In this paper, we propose a novel classifier to detect variants of malware families and improve malware detection using CNN-based deep learning arch...
Article
Full-text available
Digital Watermarking is required in multimedia applications where access to sensitive information has to be protected against malicious attacks. Since the digital text is one of the most widely used digital media on the Internet, the significant part of Web sites, social media, articles, eBooks, and so on is only plain text. Thus, copyrights protec...
Article
Healthcare network as a new context-aware cyber-physical systems (CPS) includes embedded sensors, IoT technology and cloud computing. With the intellectualization of mobile terminal devices, mobile healthcare networks are automatically generated and can provide convenient healthcare services and real-time communication. However, two problems in the...
Article
Full-text available
Internet of Things (IoT) has gained a significant importance due to its flexibility in integrating communication technologies and smart devices for ease of service provisioning. IoT services rely on heterogeneous cloud network for serving user demands ubiquitously. Service data management is a complex task in this heterogeneous environment due to r...
Article
Full-text available
Source Code Authorship Attribution (SCAA) is to find the real author of source code in a corpus. Though, it is a privacy threat to open-source programmers, but, it may be significantly helpful to develop forensic based applications. Such as, ghostwriting detection, copyright dispute settlements, and other code analysis applications. The efficient f...
Article
Full-text available
Recently, IoT has greatly influenced our daily lives through various applications. One of the most promising application is smart city that leverages IoT devices to manage cities without any human intervention. The high possibility of sensing and publishing sensitive data in this smart environment leads to three significant issues: (1) privacy-pres...

Citations

... In MEC, there are heterogeneous network resource allocation and computing task offloading; hence, joint optimization of such problems has become the researchers' main research direction [5][6][7]. For specific scenarios with a large number of computationally intensive tasks, it is also important to study the relevant energy-efficient offload models, which will enable the optimization of system energy efficiency [8][9][10][11][12]. ...
... For SAA in different programming languages, Bogomolov et al. [4] proposed two languageagnostic models: Random Forest Model and Neural Network Model (code2vec [29]) using path-based representation of code generated from the AST. CroLSSim [30], a tool for detecting semantically related software across various programming languages was developed using AST-MDrep (Abstract Syntax Tree-Methods Description) features for codes and LSA (Latent Semantic Analysis) to reduce the high-dimensional space. Finally, some studies propose automatic feature learning using deep learning techniques [1]. ...
... Articles are also saturated with deep learning techniques that deliver prediction and highlight at-risk students. Few other technologies provide opportunities to accurately evaluate the performance and reduce the failure rates [78][79][80][81][82]. It also helps in counseling students in alarming situations that can positively impact their academic achievements, i.e., COVID-19. ...
... With the rapid development of modern information technology and the arrival of the era of big data and the Internet+ [1], "University Computer Fundamentals" has become a public basic course for all majors in colleges and universities, and it is an essential part of the knowledge system for professional personnel training [2]. Its teaching goal is to comprehensively cultivate students' information literacy, cultivate students' good computational thinking ability, and enable students to apply computers to learn related courses in various disciplines, so as to improve the computer application level of college students and use computers to solve problems [3]. Blended teaching is a combination of traditional teaching methods and information technology methods [4]. ...
... After obtaining the legitimate certificate from θ Ra , EVs can store their energy trading data in the IPFS that further generates the corresponding hash keys for them. Furthermore, public key cryptography associated with the public-private key pair for the EVs can be used to ensure authenticity and transparency in the energy trading based on the blockchain network [38]. The complete procedure of blockchain-based secure data storage for p and q number of EVs, i.e., prosumer and consumer, can be computed in terms of the time complexity of O(p) and O(q if α r ∈ authorized( αr ) then 8: ...
... Their findings suggested the applicability of their method in addressing such issue of vaccine distribution and its need worldwide. In the study by Zaidan (2021a), the same authors of the previous manuscript discussed utilising MCDM for prioritising vaccine recipients with a more robust, stronger MCDM approach. They used a new fuzzy environment to address the uncertainty issues found in many MCDM context problems, especially those that can be linked with vaccine distribution for COVID-19. ...
... In [34], the authors applied different scenarios to the basic form of the FDOSM and made comparisons between different aggregation operators. Additionally, in [35], the authors extended the FDOSM into a q-rung orthopair fuzzy method and integrated the FDOSM with another method (i.e., the fuzzy weighted zero inconsistency method). In [36], the authors extended the FDOSM into the Pythagorean fuzzy numbers. ...
... -Identifying key challenges for planning, evaluating, and modeling vaccine efficacy trials for emerging pathogens ) -Dynamic COVID-19 vaccine distribution (Albahri et al. 2021) -Fair distribution of the flu vaccine to potential vaccine recipients during the fall and winter flu season in Iran (Rastegar et al. 2021). • Social distancing models: One of the effective measures for preventing pandemic spread is to keep social distance among individuals. ...
... The three methods are outward expansion, weighted average and self-organization. Outward expansion refers to seeking outside help and expanding the number of individuals participating in decision-making when collecting and evaluating decision-making schemes (Afza et al., 2021;Alrubayi et al., 2021;Lai & Lee, 2020;Pal et al., 2019;Yao et al., 2021). We find that among the three means mentioned above, outward expansion is the most effective, though it is more difficult to implement. ...
... Therefore, assuring security with secrecy is essential in the smart city network. 10 The IoT is used to organize the smart devices with sensors that create ubiquitous environment. 11 The most difficult aspect of IoT implementation offers transparent together with seamless services while maintaining secrecy. ...