Skip to main content

Showing 1–22 of 22 results for author: Alqahtani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01109  [pdf, other

    cs.CR cs.AI

    An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

    Authors: Abdullah H Alqahtani

    Abstract: Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by sep… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  2. arXiv:2402.12538  [pdf

    cs.SI cs.LG

    A Machine Learning Ensemble Model for the Detection of Cyberbullying

    Authors: Abulkarim Faraj Alqahtani, Mohammad Ilyas

    Abstract: The pervasive use of social media platforms, such as Facebook, Instagram, and X, has significantly amplified our electronic interconnectedness. Moreover, these platforms are now easily accessible from any location at any given time. However, the increased popularity of social media has also led to cyberbullying.It is imperative to address the need for finding, monitoring, and mitigating cyberbully… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Journal ref: International Journal of Artificial Intelligence and Applications (IJAIA), Vol.15, No.1, January 2024

  3. arXiv:2401.13584  [pdf

    cs.CR

    Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags

    Authors: Hosam Alamleh, Michael Gogarty, David Ruddell, Ali Abdullah S. AlQahtani

    Abstract: This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdrop**, jamming, app security flaws, Bl… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  4. arXiv:2401.11326  [pdf

    cs.CR

    Navigating Cybersecurity Training: A Comprehensive Review

    Authors: Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  5. arXiv:2401.06612  [pdf

    cs.CR

    Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy

    Abstract: The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuou… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  6. arXiv:2311.13416  [pdf

    cs.CR

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Authors: Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent… ▽ More

    Submitted 20 January, 2024; v1 submitted 7 July, 2023; originally announced November 2023.

  7. Deep learning in computed tomography pulmonary angiography imaging: a dual-pronged approach for pulmonary embolism detection

    Authors: Fabiha Bushra, Muhammad E. H. Chowdhury, Rusab Sarmun, Saidul Kabir, Menatalla Said, Sohaib Bassam Zoghoul, Adam Mushtak, Israa Al-Hashimi, Abdulrahman Alqahtani, Anwarul Hasan

    Abstract: The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effective… ▽ More

    Submitted 5 January, 2024; v1 submitted 9 November, 2023; originally announced November 2023.

    Comments: Published in Expert Systems With Applications

    Journal ref: Expert Systems With Applications, Volume 245, 1 July 2024, 123029

  8. arXiv:2304.09468  [pdf

    cs.CR cs.NI

    Secure Mobile Payment Architecture Enabling Multi-factor Authentication

    Authors: Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi

    Abstract: The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  9. arXiv:2303.02503  [pdf

    cs.CR cs.LG

    Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb

    Abstract: The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  10. arXiv:2210.00270  [pdf

    cs.CR

    ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

    Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury

    Abstract: For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  11. arXiv:2210.00175  [pdf

    cs.CR cs.LG

    Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Baker Al Smadi

    Abstract: Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  12. arXiv:2209.13073  [pdf

    cs.CR

    Preprint: Privacy-preserving IoT Data Sharing Scheme

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili

    Abstract: Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is expe… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  13. arXiv:2203.14178  [pdf

    cs.NI eess.SP

    Energy Efficient VM Placement in a Heterogeneous Fog Computing Architecture

    Authors: Abdullah M. Alqahtani, Barzan Yosuf, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

    Abstract: Recent years have witnessed a remarkable development in communication and computing systems, mainly driven by the increasing demands of data and processing intensive applications such as virtual reality, M2M, connected vehicles, IoT services, to name a few. Massive amounts of data will be collected by various mobile and fixed terminals that will need to be processed in order to extract knowledge f… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

  14. arXiv:2201.10430  [pdf, other

    cs.CL

    A Quantitative and Qualitative Analysis of Schizophrenia Language

    Authors: Amal Alqahtani, Efsun Sarioglu Kay, Sardar Hamidian, Michael Compton, Mona Diab

    Abstract: Schizophrenia is one of the most disabling mental health conditions to live with. Approximately one percent of the population has schizophrenia which makes it fairly common, and it affects many people and their families. Patients with schizophrenia suffer different symptoms: formal thought disorder (FTD), delusions, and emotional flatness. In this paper, we quantitatively and qualitatively analyze… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

  15. arXiv:2110.15204  [pdf

    cs.NI eess.SP

    Energy Efficient Resource Allocation in Federated Fog Computing Networks

    Authors: Abdullah M. Alqahtani, Barzan Yosuf, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

    Abstract: There is a continuous growth in demand for time sensitive applications which has shifted the cloud paradigm from a centralized computing architecture towards distributed heterogeneous computing platforms where resources located at the edge of the network are used to provide cloud-like services. This paradigm is widely known as fog computing. Virtual machines (VMs) have been widely utilized in both… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  16. arXiv:2105.10242  [pdf

    cs.NI eess.SP

    Energy Minimized Federated Fog Computing over Passive Optical Networks

    Authors: Abdullah M. Alqahtani, Barzan Yosuf, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

    Abstract: The rapid growth of time-sensitive applications and services has driven enhancements to computing infrastructures. The main challenge that needs addressing for these applications is the optimal placement of the end-users demands to reduce the total power consumption and delay. One of the widely adopted paradigms to address such a challenge is fog computing. Placing fog units close to end-users at… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

  17. arXiv:2005.00839  [pdf

    cs.NI eess.SP

    PON-based connectivity for fog computing

    Authors: Abdullah M. Alqahtani, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

    Abstract: Fog computing plays a crucial role in satisfying the requirements of delay-sensitive applications such as connected vehicles, smart grids, and actuator networks by moving data processing close to end users. Passive optical networks (PONs) are widely used in access networks to reduce the power consumption while providing high bandwidth to end users under flexible designs. Typically, distributed fog… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

  18. arXiv:1907.10410  [pdf, other

    cs.LG stat.ML

    Constrained Clustering: General Pairwise and Cardinality Constraints

    Authors: Adel Bibi, Ali Alqahtani, Bernard Ghanem

    Abstract: We study constrained clustering, where constraints guide the clustering process. In existing works, two categories of constraints have been widely explored, namely pairwise and cardinality constraints. Pairwise constraints enforce the cluster labels of two instances to be the same (must-link constraints) or different (cannot-link constraints). Cardinality constraints encourage cluster sizes to sat… ▽ More

    Submitted 27 January, 2023; v1 submitted 24 July, 2019; originally announced July 2019.

  19. arXiv:1902.10402  [pdf

    cs.SI cs.LG

    Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions

    Authors: Bilal Abu-Salih, Bushra Bremie, Pornpit Wongthongtham, Kevin Duan, Tomayess Issa, Kit Yan Chan, Mohammad Alhabashneh, Teshreen Albtoush, Sulaiman Alqahtani, Abdullah Alqahtani, Muteeb Alahmari, Naser Alshareef, Abdulaziz Albahlal

    Abstract: The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

  20. arXiv:1810.05937  [pdf, other

    cs.DC

    End-to-End Service Level Agreement Specification for IoT Applications

    Authors: Awatif Alqahtani, Yinhao Li, Pankesh Patel, Ellis Solaiman, Rajiv Ranjan

    Abstract: The Internet of Things (IoT) promises to help solve a wide range of issues that relate to our wellbeing within application domains that include smart cities, healthcare monitoring, and environmental monitoring. IoT is bringing new wireless sensor use cases by taking advantage of the computing power and flexibility provided by Edge and Cloud Computing. However, the software and hardware resources u… ▽ More

    Submitted 13 October, 2018; originally announced October 2018.

  21. arXiv:1810.02749  [pdf, other

    cs.DC

    Demonstration Abstract: A Toolkit for Specifying Service Level Agreements for IoT applications

    Authors: Awatif Alqahtani, Pankesh Patel, Ellis Solaiman, Rajiv Ranjan

    Abstract: Today we see the use of the Internet of Things (IoT) in various application domains such as healthcare, smart homes, smart cars, and smart-x applications in smart cities. The number of applications based on IoT and cloud computing is projected to increase rapidly over the next few years. IoT-based services must meet the guaranteed levels of quality of service (QoS) to match users' expectations. En… ▽ More

    Submitted 5 October, 2018; originally announced October 2018.

  22. arXiv:1805.04007   

    cs.DC cs.AI cs.IR

    A Unified Knowledge Representation and Context-aware Recommender System in Internet of Things

    Authors: Yinhao Li, Awa Alqahtani, Ellis Solaiman, Charith Perera, Prem Prakash Jayaraman, Boualem Benatallah, Rajiv Ranjan

    Abstract: Within the rapidly develo** Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representat… ▽ More

    Submitted 24 May, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: This paper is an incomplete draft. Therefore, I would like to withdraw it