Nour Moustafa
Orcid: 0000-0001-6127-9349
According to our database1,
Nour Moustafa
authored at least 139 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems.
Cogn. Comput., September, 2024
A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks.
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks.
IEEE Trans. Consumer Electron., February, 2024
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications.
IEEE Internet Things J., February, 2024
Explainable deep learning for attack intelligence and combating cyber-physical attacks.
Ad Hoc Networks, February, 2024
A threat intelligence framework for protecting smart satellite-based healthcare networks.
Neural Comput. Appl., January, 2024
J. Cybersecur., January, 2024
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Engineering Management, 2024
A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future.
Eng. Appl. Artif. Intell., 2024
Digit. Commun. Networks, 2024
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach.
Digit. Commun. Networks, 2024
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions.
CoRR, 2024
A Predictive Profiling and Performance Modeling Approach for Distributed Stream Processing in Edge.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
2023
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities.
Sensors, September, 2023
An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks.
Neural Comput. Appl., September, 2023
Inf. Sci., August, 2023
IEEE J. Biomed. Health Informatics, April, 2023
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks.
IEEE Trans. Ind. Informatics, March, 2023
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports.
IEEE Trans. Intell. Transp. Syst., February, 2023
Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications.
IEEE Internet Things J., February, 2023
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023
An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Serv. Comput., 2023
DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing.
IEEE Trans. Intell. Transp. Syst., 2023
Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.
J. Netw. Syst. Manag., 2023
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey.
ACM Comput. Surv., 2023
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions.
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Studies in Computational Intelligence 997, Springer, ISBN: 978-3-030-89024-7, 2022
Wirel. Networks, 2022
Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2022
A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics.
IEEE Trans. Intell. Transp. Syst., 2022
Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management.
IEEE Trans. Intell. Transp. Syst., 2022
An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
AI-Driven Synthetic Biology for Non-Small Cell Lung Cancer Drug Effectiveness-Cost Analysis in Intelligent Assisted Medical Systems.
IEEE J. Biomed. Health Informatics, 2022
Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems.
IEEE J. Biomed. Health Informatics, 2022
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems.
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System.
IEEE Trans. Ind. Informatics, 2022
Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Green Commun. Netw., 2022
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network.
IEEE Trans. Dependable Secur. Comput., 2022
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems.
IEEE Trans. Cloud Comput., 2022
Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children.
Image Vis. Comput., 2022
Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication.
Inf. Sci., 2022
A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks.
IEEE Internet Things J., 2022
ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets.
IEEE Internet Things J., 2022
H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information.
IEEE Internet Things J., 2022
One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data.
Int. J. Intell. Syst., 2022
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks.
Future Gener. Comput. Syst., 2022
Future Gener. Comput. Syst., 2022
Digit. Commun. Networks, 2022
Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions.
IEEE Consumer Electron. Mag., 2022
A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks.
Comput. Electr. Eng., 2022
A holistic survey on the use of emerging technologies to provision secure healthcare solutions.
Comput. Electr. Eng., 2022
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems.
Ad Hoc Networks, 2022
IEEE Access, 2022
Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks.
IEEE Trans. Sustain. Comput., 2021
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
Two-Stage Deep Learning Framework for Discrimination between COVID-19 and Community-Acquired Pneumonia from Chest CT scans.
Pattern Recognit. Lett., 2021
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing.
J. Syst. Archit., 2021
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021
Hunter in the Dark: Discover Anomalous Network Activities Using Deep Ensemble Networks.
CoRR, 2021
CoRR, 2021
Appl. Soft Comput., 2021
IEEE Access, 2021
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021
A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles.
IEEE Access, 2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021
2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework.
Future Gener. Comput. Syst., 2020
Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective.
Trans. Emerg. Telecommun. Technol., 2020
CoRR, 2020
Enhancing network forensics with particle swarm and deep learning: The particle deep framework.
CoRR, 2020
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Comput. Secur., 2020
IEEE Access, 2020
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems.
IEEE Access, 2020
A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions.
IEEE Access, 2020
Proceedings of the Big Data Technologies and Applications, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Autonomous detection of malicious events using machine learning models in drone networks.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
A Novel Cognitive Computing Technique Using Convolutional Networks for Automating the Criminal Investigation Process in Policing.
Proceedings of the Intelligent Systems and Applications, 2020
A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks.
Proceedings of the Intelligent Systems and Applications, 2020
A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems.
Proceedings of the AI 2020: Advances in Artificial Intelligence, 2020
2019
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks.
IEEE Trans. Big Data, 2019
J. Netw. Comput. Appl., 2019
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019
A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing.
CoRR, 2019
Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions.
IEEE Access, 2019
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019
2018
IEEE Trans. Emerg. Top. Comput. Intell., 2018
Identification of malicious activities in industrial internet of things based on deep learning models.
J. Inf. Secur. Appl., 2018
IEEE Access, 2018
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018
2017
Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic.
PhD thesis, 2017
Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic.
PhD thesis, 2017
CoRR, 2017
CoRR, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017
2016
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
Inf. Secur. J. A Glob. Perspect., 2016
2015
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015
The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015