Suivre
Adel Abusitta
Titre
Citée par
Citée par
Année
A deep learning approach for proactive multi-cloud cooperative intrusion detection system
A Abusitta, M Bellaiche, M Dagenais, T Halabi
Future Generation Computer Systems 98, 308-318, 2019
1222019
Malware classification and composition analysis: A survey of recent developments
A Abusitta, MQ Li, BCM Fung
Journal of Information Security and Applications 59, 102828, 2021
712021
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment
A Abusitta, M Bellaiche, M Dagenais
Journal of Cloud Computing 7 (1), 1-18, 2018
462018
Deep learning-enabled anomaly detection for IoT systems
A Abusitta, GHS de Carvalho, OA Wahab, T Halabi, BCM Fung, ...
Internet of Things 21, 100656, 2023
442023
A visual cryptography based watermark technology for individual and group images
A Sleit, A Abusitta
Journal of Systemics, Cybernetics and Informatics 5 (2), 24-32, 2008
332008
A visual cryptography based digital image copyright protection
AH Abusitta
Scientific Research Publishing, 2012
282012
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments
A Abusitta, M Bellaiche, M Dagenais
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
252018
Generative adversarial networks for mitigating biases in machine learning systems
A Abusitta, E Aïmeur, OA Wahab
arXiv preprint arXiv:1905.09972, 2019
222019
An efficient pattern matching algorithm
A Sleit, W AlMobaideen, AH Baarah, AH Abusitta
Journal of Applied Sciences 7 (18), 269-2695, 2007
192007
Teens-online: A game theory-based collaborative platform for privacy education
R Yusri, A Abusitta, E Aïmeur
International Journal of Artificial Intelligence in Education 31, 726-768, 2021
172021
A cooperative game for online cloud federation formation based on security risk assessment
T Halabi, M Bellaiche, A Abusitta
2018 5th IEEE International Conference on Cyber Security and Cloud Computing …, 2018
162018
Multi-cloud cooperative intrusion detection system: trust and fairness assurance
A Abusitta, M Bellaiche, M Dagenais
Annals of Telecommunications 74, 637-653, 2019
132019
Online allocation of cloud resources based on security satisfaction
T Halabi, M Bellaiche, A Abusitta
2018 17th IEEE international conference on trust, security and privacy in …, 2018
132018
Bi-discriminator GAN for tabular data synthesis
M Esmaeilpour, N Chaalia, A Abusitta, FX Devailly, W Maazoun, ...
Pattern Recognition Letters 159, 204-210, 2022
102022
Toward secure resource allocation in mobile cloud computing: A matching game
T Halabi, M Bellaiche, A Abusitta
2019 International Conference on Computing, Networking and Communications …, 2019
102019
Cloud security up for auction: a DSIC online mechanism for secure iaas resource allocation
T Halabi, M Bellaiche, A Abusitta
2018 2nd Cyber Security in Networking Conference (CSNet), 1-8, 2018
92018
VirtualGAN: reducing mode collapse in generative adversarial networks using virtual mapping
A Abusitta, OA Wahab, BCM Fung
2021 International Joint Conference on Neural Networks (IJCNN), 1-6, 2021
72021
On the effectiveness of interpretable feedforward neural network
MQ Li, BCM Fung, A Abusitta
2022 International Joint Conference on Neural Networks (IJCNN), 1-8, 2022
52022
12 Deep learning for proactive cooperative malware detection system
A Abusitta, OA Wahab, T Halabi
Edge Intelligence Workshop 711 (23), 7, 2020
52020
Robust: Deep learning for malware detection under changing environments
A Abusitta, T Halabi, OA Wahab
AIofAI 21, 1-13, 2021
42021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20