Mohamed Chahine Ghanem
YOU?
Author Swipe
View article: ACO-Based Path Optimization Inspired by TSP for Routing Efficiency in Communication Networks
ACO-Based Path Optimization Inspired by TSP for Routing Efficiency in Communication Networks Open
Traveling Salesman Problem (TSP) is a well-known combinatorial optimization problem, and it is generally concerned with searching for this shortest tour that passes through each of a collection of cities and returns to the point of departu…
View article: Efficient Fine-Grained FPGA Optimization for AES MixColumn and InvMixColumn
Efficient Fine-Grained FPGA Optimization for AES MixColumn and InvMixColumn Open
View article: A Framework for Embedding Generative and Agentic AI in Open Source Intelligence
A Framework for Embedding Generative and Agentic AI in Open Source Intelligence Open
View article: Learning Representations Through Contrastive Neural Model Checking
Learning Representations Through Contrastive Neural Model Checking Open
Model checking is a key technique for verifying safety-critical systems against formal specifications, where recent applications of deep learning have shown promise. However, while ubiquitous for vision and language domains, representation…
View article: Adaptive Hybrid PSO–APF Algorithm for Advanced Path Planning in Next-Generation Autonomous Robots
Adaptive Hybrid PSO–APF Algorithm for Advanced Path Planning in Next-Generation Autonomous Robots Open
The field of autonomous robotics is progressing rapidly, with research moving toward developing systems capable of moving without direct human control and learning without human intervention. One of the problems requiring an efficient and …
View article: Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response
Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response Open
View article: A robust cross-domain IDS using BiGRU-LSTM-attention for medical and industrial IoT security
A robust cross-domain IDS using BiGRU-LSTM-attention for medical and industrial IoT security Open
The increased Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT) interconnectivity has introduced complex cybersecurity challenges, exposing sensitive data, patient safety, and industrial operations to advanced …
View article: A Framework for Embedding Generative and Agentic AI in Open Source Intelligence (OSINT)
A Framework for Embedding Generative and Agentic AI in Open Source Intelligence (OSINT) Open
View article: Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response
Leveraging Reinforcement Learning for an Efficient Windows Registry Analysis during Cyber Incident Response Open
Microsoft Windows is a widely deployed operating system, making forensic analysis, notably registry analysis, a common practice and central task in cyber incident response. However, the growing complexity of modern cyberattacks, the rapid …
View article: Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis
Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis Open
Cyber-Physical Systems (CPS) seamlessly integrate computers, networks, and physical devices, enabling machines to communicate, process data, and respond to real-world conditions in real time. By bridging the digital and physical worlds, CP…
View article: A Robust Cross-Domain IDS using BiGRU-LSTM-Attention for Medical and Industrial IoT Security
A Robust Cross-Domain IDS using BiGRU-LSTM-Attention for Medical and Industrial IoT Security Open
The increased Internet of Medical Things IoMT and the Industrial Internet of Things IIoT interconnectivity has introduced complex cybersecurity challenges, exposing sensitive data, patient safety, and industrial operations to advanced cybe…
View article: TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs
TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs Open
E-Learning is an emerging dominant phenomenon in education, making the development of robust models that can accurately represent the dynamic behavior of learners in MOOCs even more critical. In this article, we propose the Temporal Sparse…
View article: TSA-GRU: A Novel Hybrid Deep Learning Module for learner behavior analytics in MOOCs
TSA-GRU: A Novel Hybrid Deep Learning Module for learner behavior analytics in MOOCs Open
E-Learning is an emerging dominant phenomenon in education, making the development of robust models that can accurately represent the dynamic behavior of learners in MOOCs even more critical. In this article, we propose Temporal Sparse Att…
View article: Brain Tumour Segmentation Using Choquet Integrals and Coalition Game
Brain Tumour Segmentation Using Choquet Integrals and Coalition Game Open
Artificial Intelligence (AI) and computer-aided diagnosis (CAD) have revolutionised various aspects of modern life, particularly in the medical domain. These technologies enable efficient solutions for complex challenges, such as accuratel…
View article: Self-Healing Network of Interconnected Edge Devices Empowered by Infrastructure-as-Code and LoRa Communication
Self-Healing Network of Interconnected Edge Devices Empowered by Infrastructure-as-Code and LoRa Communication Open
View article: "MalVol-25: A Diverse, Labeled and Detailed Malware Volatile Memory Dataset for Detection and Response Testing and Validation"
"MalVol-25: A Diverse, Labeled and Detailed Malware Volatile Memory Dataset for Detection and Response Testing and Validation" Open
"This paper addresses the critical need for high-quality malware datasets that support advanced analysis techniques, particularly reinforcement learning (RL). Existing datasets often lack diversity, comprehensive labelling, and the complex…
View article: Security Compliance of IoT Devices with the UK PSTI Act: A Comparative Analysis
Security Compliance of IoT Devices with the UK PSTI Act: A Comparative Analysis Open
View article: Integrating AI-Driven Deep Learning for Energy-Efficient Smart Buildings in Internet of Thing-based Industry 4.0
Integrating AI-Driven Deep Learning for Energy-Efficient Smart Buildings in Internet of Thing-based Industry 4.0 Open
The integration of Industry 4.0 technologies has paved the way for rapid advancements in smart, energy-efficient buildings. This research focuses on optimizing energy consumption in IoT-enabled infrastructures through the application of da…
View article: Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning
Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning Open
This article investigates the application of Deep Reinforcement Learning (DRL) for attributing malware to specific Advanced Persistent Threat (APT) groups through detailed behavioural analysis. By analysing over 3,500 malware samples from …
View article: Security Compliance of IoT Devices with the UK PSTI Act: A Comparative Analysis
Security Compliance of IoT Devices with the UK PSTI Act: A Comparative Analysis Open
View article: A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention
A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention Open
Distributed Denial of Service (DDoS) attacks pose significant threats to Industrial Internet of Things (IIoT) environments, exacerbated by the resource constraints of IoT devices and the disruptive impact of such attacks. Conventional dete…
View article: A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention
A Systematic Analysis on the Use of AI Techniques in Industrial IoT DDoS Attacks Detection, Mitigation and Prevention Open
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuse…
View article: Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities
Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities Open
Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensiv…
View article: Beyond Detection: Large Language Models and Next-Generation Cybersecurity
Beyond Detection: Large Language Models and Next-Generation Cybersecurity Open
The Integrating Contextual and Adaptive Cyber Defense Systems The accelerating evolution of cyber threats, seen both in terms of their complexity and frequency of attempts, makes it imperative to move away from traditional, reactive defens…
View article: Advancing Cyber Incident Timeline Analysis Through Retrieval-Augmented Generation and Large Language Models
Advancing Cyber Incident Timeline Analysis Through Retrieval-Augmented Generation and Large Language Models Open
Cyber timeline analysis or forensic timeline analysis is critical in digital forensics and incident response (DFIR) investigations. It involves examining artefacts and events—particularly their timestamps and associated metadata—to detect …
View article: Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis
Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis Open
View article: Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis
Synchronization, Optimization, and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis Open
Cyber-Physical Systems (CPS) seamlessly integrate computers, networks, and physical devices, enabling machines to communicate, process data, and respond to real-world conditions in real-time. By bridging the digital and physical worlds, CP…
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents …
View article: Reinforcement learning for an efficient and effective malware investigation during cyber incident response
Reinforcement learning for an efficient and effective malware investigation during cyber incident response Open
The ever-escalating prevalence of malware is a serious cybersecurity threat, often requiring advanced post-incident forensic investigation techniques. This paper proposes a framework to enhance malware forensics by leveraging reinforcement…