Marwa Keshk

Orcid: 0000-0001-5749-0408

According to our database1, Marwa Keshk authored at least 20 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security.
Ad Hoc Networks, 2025

PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks.
Ad Hoc Networks, 2025

2024
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks.
IEEE Trans. Consumer Electron., February, 2024

2023
An explainable deep learning-enabled intrusion detection framework in IoT networks.
Inf. Sci., August, 2023

Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions.
IEEE Commun. Surv. Tutorials, 2023

Non-stationarity Detection in Model-Free Reinforcement Learning via Value Function Monitoring.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

2022
Privacy-preserving big data analytics for cyber-physical systems.
Wirel. Networks, 2022

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems.
Ad Hoc Networks, 2022

2021
Protection of data privacy based on artificial intelligence in Cyber-Physical Systems.
PhD thesis, 2021

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021

2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Comput. Secur., 2020

Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2018
Automatic estimation of differential evolution parameters using Hidden Markov Models.
Evol. Intell., 2018

2017
Semantic Evolutionary Visualization.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Collaborative anomaly detection framework for handling big data of cloud computing.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

Privacy preservation intrusion detection technique for SCADA systems.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017


  Loading...