Browsing by Author "Fetais N."
Now showing items 1-15 of 15
-
CloudSafe: A tool for an automated security analysis for cloud computing
An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; Fetais N.; Khan K.M.; Kim D.S.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
Mhaisen N.; Fetais N.; Massoud A. ( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ... -
Short survey of techniques for visualizing events recorded in logs
Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ... -
SpiralSRA: A threat-specific security risk assessment framework for the cloud
Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ... -
Systematic identification of threats in the cloud: A Survey
Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; Kim D.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
Mhaisen N.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Elsevier B.V. , 2020 , Article)Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ... -
Traffic Analysis Attacks on Tor: A Survey
Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ... -
Unsupervised Technique for Anomaly Detection in Qatar Stock Market
Al-Thani H.; Hassen H.; Al-Maadced S.; Fetais N.; Jaoua A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The aim of anomaly detection is to find patterns or data points that are not confirming the expected behavior inside the dataset. Techniques from a variety of disciplines like machine learning, statistics, information ... -
Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques
Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ... -
Virtual Reality Glove for Falconry
Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ... -
Visualization as a mean of big data management: Using Qatar's electricity consumption data
Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...