Qais Al-Na’amneh
YOU?
Author Swipe
View article: Optimized security-aware VM placement for enhanced intrusion tolerance and resilience in IaaS clouds using MILP
Optimized security-aware VM placement for enhanced intrusion tolerance and resilience in IaaS clouds using MILP Open
Infrastructure-as-a-Service (IaaS) clouds offer unparalleled flexibility but introduce complex security challenges, particularly concerning Virtual Machine (VM) placement. Security-oblivious VM allocation can lead to catastrophic failures …
View article: A Novel Scheme to Optimize LSB Steganography Based on a Logistic Chaotic Map and Genetic Algorithm
A Novel Scheme to Optimize LSB Steganography Based on a Logistic Chaotic Map and Genetic Algorithm Open
View article: Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review
Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review Open
The rapid advancement of autonomous driving technology has transformed modern transportation, offering enhanced safety, efficiency, and convenience. However, as these vehicles become increasingly connected and reliant on complex software a…
View article: Autonomous Self-Adaptation in the Cloud: ML-Heal’s Framework for Proactive Fault Detection and Recovery
Autonomous Self-Adaptation in the Cloud: ML-Heal’s Framework for Proactive Fault Detection and Recovery Open
View article: Empowering End-Users: An Intuitive Framework for Service Composition and Adaptation in Pervasive Environments
Empowering End-Users: An Intuitive Framework for Service Composition and Adaptation in Pervasive Environments Open
View article: Strategic Optimization of Convergence and Energy in Federated Learning Systems
Strategic Optimization of Convergence and Energy in Federated Learning Systems Open
Federated Learning (FL) is a Machine Learning (ML) paradigm in which multiple devices collaboratively train a model without sharing their local data. This decentralized approach provides significant privacy benefits, enabling compliance wi…
View article: Jordanian banknote data recognition: A CNN-based approach with attention mechanism
Jordanian banknote data recognition: A CNN-based approach with attention mechanism Open
Identifying counterfeit banknotes is crucial in financial transactions, as the process of identification cannot be handled by ATMs or vending machines. The recent developments in technology, particularly the smart systems that are integrat…
View article: Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks Open
The Internet of Things (IoT) has expanded into a realm of cutting-edge integrated solutions across numerous applications, following three stages of development: communication, authentication, and computing. However, each layer inside the t…
View article: A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis Open
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorithm is proposed to addre…