Mohamed Chahine Ghanem
Orcid: 0000-0002-7067-7848
According to our database1,
Mohamed Chahine Ghanem
authored at least 18 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
8
9
1
7
6
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory.
CoRR, January, 2025
2024
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.
Network, January, 2024
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques.
Internet Things, 2024
A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response.
Forensic Sci. Int. Digit. Investig., 2024
CoRR, 2024
Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models.
CoRR, 2024
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response.
CoRR, 2024
AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments.
CoRR, 2024
Proceedings of the 11th International Conference on Social Networks Analysis, 2024
2023
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities.
J. Cybersecur. Priv., November, 2023
Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
J. Intell. Inf. Syst., April, 2023
A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response.
CoRR, 2023
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance.
CoRR, 2023
The Automation of the Extraction of Evidence masked by Steganographic Techniques in WAV and MP3 Audio Files.
CoRR, 2023
ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance.
IEEE Access, 2023
2020
2016
Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016
1996
A new control strategy to achieve sinusoidal line current in a cascade buck-boost converter.
IEEE Trans. Ind. Electron., 1996