Mohamed Chahine Ghanem

Orcid: 0000-0002-7067-7848

According to our database1, Mohamed Chahine Ghanem authored at least 18 papers between 1996 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2000
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
8
9
1
7
6
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory.
CoRR, January, 2025

2024
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.
Network, January, 2024

Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques.
Internet Things, 2024

A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response.
Forensic Sci. Int. Digit. Investig., 2024

Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning.
CoRR, 2024

Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models.
CoRR, 2024

Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response.
CoRR, 2024

AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments.
CoRR, 2024

A Novel Reinforcement Learning Model for Post-Incident Malware Investigations.
Proceedings of the 11th International Conference on Social Networks Analysis, 2024

2023
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities.
J. Cybersecur. Priv., November, 2023

Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
J. Intell. Inf. Syst., April, 2023

A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response.
CoRR, 2023

ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance.
CoRR, 2023

The Automation of the Extraction of Evidence masked by Steganographic Techniques in WAV and MP3 Audio Files.
CoRR, 2023

ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance.
IEEE Access, 2023

2020
Reinforcement Learning for Efficient Network Penetration Testing.
Inf., 2020

2016
Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

1996
A new control strategy to achieve sinusoidal line current in a cascade buck-boost converter.
IEEE Trans. Ind. Electron., 1996


  Loading...