Shereen Ismail
YOU?
Author Swipe
Among the DLTs: Holochain for the Security of IoT Distributed Networks—A Review and Conceptual Framework Open
IoT devices are typically resource-constrained, with limited computational power, storage, and energy. Holochain, an emerging distributed ledger technology (DLT), offers the benefits of blockchain while overcoming its limitations, such as …
Intrusion Detection in IoT and IIoT: Comparing Lightweight Machine Learning Techniques Using TON_IoT, WUSTL-IIOT-2021, and EdgeIIoTset Datasets Open
The security of Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems has been significantly enhanced through the integration of effective intrusion detection systems (IDSs). Machine learning (ML) has emerged as a highl…
Perceptions, attitudes, and demographic influences on metaverse: A comprehensive investigation Open
The Metaverse represents an innovative post-reality universe that seamlessly blends physical reality with virtual digital environments, facilitated by advanced technologies like virtual reality. As the adoption of Metaverse gains momentum,…
A Blockchain-Based Fish Supply Chain Framework for Maintaining Fish Quality and Authenticity Open
The fish supply chain (FSC) industry faces a significant challenge in terms of maintaining fish quality and authenticity throughout the chain. The main goal of modern FSC systems is tracking and tracing the fish product at each stage, from…
Blockchain-Based Zero Trust Supply Chain Security Integrated with Deep Reinforcement Learning Open
The modern supply chain (SC) is growing in terms of data, devices, users, and stakeholders, which introduced new security challenges and threats, especially with the reliance on centralized servers or cloud platforms. In addition, increase…
A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks Detection in Blockchain-Enabled Industrial Supply Chain Open
The security of Industrial Supply Chain (ISC) has emerged through the integration of Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves effectively protecting IIoT systems from various threats and en…
Towards a lightweight security framework using blockchain and machine learning Open
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique characteristics and limitations. Various prevention an…
Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review Open
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective…
Toward an Intelligent Blockchain IoT-Enabled Fish Supply Chain: A Review and Conceptual Framework Open
The fish industry experiences substantial illegal, unreported, and unregulated (IUU) activities within traditional supply chain systems. Blockchain technology and the Internet of Things (IoT) are expected to transform the fish supply chain…
Rapid Assessment of Fish Freshness for Multiple Supply-Chain Nodes Using Multi-Mode Spectroscopy and Fusion-Based Artificial Intelligence Open
This study is directed towards developing a fast, non-destructive, and easy-to-use handheld multimode spectroscopic system for fish quality assessment. We apply data fusion of visible near infra-red (VIS-NIR) and short wave infra-red (SWIR…
Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles Open
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially misleading the system without raising alarms. Several techniques, including machine …
An Ensemble-Based Machine Learning Approach for Cyber-Attacks Detection in Wireless Sensor Networks Open
Wireless Sensor Networks (WSNs) are the key underlying technology of the Internet of Things (IoT); however, these networks are energy constrained. Security has become a major challenge with the significant increase in deployed sensors, nec…
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs Open
Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning System spoofing. Several techniques have been proposed for detecting such attacks. However, the recurrence and frequent Global Positioning System spo…
IoT-Based Water Management Systems: Survey and Future Research Direction Open
The Internet of Things (IoT) sustainable solutions are the next generation of methods for managing and monitoring valuable natural resources such as water. Research has focused on smart IoT-based water management and monitoring system desi…
Toward Management of Uncertainty in Self-Adaptive Software Systems: IoT Case Study Open
Adaptivity is the ability of the system to change its behavior whenever it does not achieve the system requirements. Self-adaptive software systems (SASS) are considered a milestone in software development in many modern complex scientific…
Security vulnerabilities related to web-based data Open
In this digital era, organizations and industries are moving towards replacing websites with web applications for many obvious reasons. With this transition towards web-based applications, organizations and industries find themselves surro…
User Selective Encryption Method for Securing MANETs Open
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and …
Prison Perimeter Surveillance System Using WSN Open
The aim of this paper is to introduce a prison hybrid surveillance system using two main technologies; Wireless Sensor Network (WSN) and Unmanned Aerial Vehicles (UAVs). The system consists of three tiers; Wireless Underground Sensor Netwo…
Blind Pre-Coder for MIMO System Capacity Enhancement Open
In this study, linear scheme at the transmitter is proposed as a blind pre-coder to improve the performance and enhance the channel capacity of MIMO systems with certain configurations for transmitting and receiving antennas over fading ch…
Object Tracking in Wireless Sensor Networks: Challenges and Solutions Open
Wireless Sensor Networks (WSNs) are small, inexpensive and battery-operated sensor nodes that are deployed over a geographical area. WSNs are used in many applications such border patrolling, military intrusion detection, wildlife animal m…