Omar A. Darwish
Orcid: 0000-0001-8346-7148Affiliations:
- Eastern Michigan University, Ypsilanti, MI, USA
According to our database1,
Omar A. Darwish
authored at least 39 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Cyberattack event logs classification using deep learning with semantic feature analysis.
Comput. Secur., 2025
2024
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features.
Clust. Comput., December, 2024
A deep learning approach for detecting covert timing channel attacks using sequential data.
Clust. Comput., April, 2024
A Survey Analysis of Internet of Things (IoT) Education Across the Top 25 Universities in the United States.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
A Notional Understanding of the Relationship between Code Readability and Software Complexity.
Inf., February, 2023
Clust. Comput., 2023
Comparative Analysis Study for Air Quality Prediction in Smart Cities Using Regression Techniques.
IEEE Access, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023
A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023
Comparative Analysis of Sequential and Parallel Computing for Object Detection Using Deep Learning Model.
Proceedings of the 24th International Arab Conference on Information Technology, 2023
2022
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning.
Int. J. Interact. Mob. Technol., July, 2022
Dynamic Traffic Light System to Reduce The Waiting Time of Emergency Vehicles at Intersections within IoT Environment.
Int. J. Comput. Commun. Control, March, 2022
Int. J. Distributed Sens. Networks, 2022
A Deep Learning Framework for Detection of COVID-19 Fake News on Social Media Platforms.
Data, 2022
IEEE Access, 2022
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Oplà Device in IoT Environment.
Proceedings of the 5th International Conference on Advanced Communication Technologies and Networking, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
On developing deep learning models with particle swarm optimization in the presence of poisoning attacks.
Proceedings of the International Arab Conference on Information Technology, 2022
A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics.
Proceedings of the International Arab Conference on Information Technology, 2022
2021
Future Internet, 2021
SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning.
IEEE Access, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Sensors, 2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Predicting Length of Stay for Cardiovascular Hospitalizations in the Intensive Care Unit: Machine Learning Approach.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay Prediction.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Using hierarchical statistical analysis and deep neural networks to detect covert timing channels.
Appl. Soft Comput., 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
2017
Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
2015
The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Fibonacci sequence based multipath load balancing approach for mobile ad hoc networks.
Ad Hoc Networks, 2014
2009
Arabic Numerals Checker: Checking Agreement between Numerals and Counted Objects in the Arabic Language.
Int. J. Comput. Process. Orient. Lang., 2009