Skip to main content

Showing 1–31 of 31 results for author: Ghanem, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05602  [pdf

    cs.CR cs.ET cs.NI

    AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments

    Authors: Mohammed Ashfaaq M. Farzaan, Mohamed Chahine Ghanem, Ayman El-Hajjar, Deepthi N. Ratnayake

    Abstract: The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments. This system, encompassing Network Traffic Classification, Web Int… ▽ More

    Submitted 10 April, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  2. arXiv:2402.08365  [pdf, other

    cs.LG cs.LO

    Learning Better Representations From Less Data For Propositional Satisfiability

    Authors: Mohamed Ghanem, Frederik Schmitt, Julian Siber, Bernd Finkbeiner

    Abstract: Training neural networks on NP-complete problems typically demands very large amounts of training data and often needs to be coupled with computationally expensive symbolic verifiers to ensure output correctness. In this paper, we present NeuRes, a neuro-symbolic approach to address both challenges for propositional satisfiability, being the quintessential NP-complete problem. By combining certifi… ▽ More

    Submitted 29 May, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

  3. A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response

    Authors: Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem

    Abstract: Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion… ▽ More

    Submitted 9 December, 2023; v1 submitted 2 December, 2023; originally announced December 2023.

    Comments: version 2.4

  4. A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes… ▽ More

    Submitted 3 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: version 2 post peer review Forensic Science International Digital Investigation

    Report number: Volume 48, 301675

    Journal ref: Forensic Science International: Digital Investigation, 2024

  5. arXiv:2309.05537  [pdf

    cs.CR cs.IR cs.NI cs.OS

    D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

    Authors: Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin

    Abstract: The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  6. ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance

    Authors: Mohamed C. Ghanem, Thomas M. Chen, Mohamed A. Ferrag, Mohyi E. Kettouche

    Abstract: The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomo… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  7. arXiv:2307.07293  [pdf

    cs.CR cs.MM

    StegoHound: A Novel Multi-Approaches Method for Efficient and Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

    Authors: Mohamed C. Ghanem, Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, Istteffanny I. Araujo

    Abstract: Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis… ▽ More

    Submitted 10 December, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: Journal of Information Security and Cybercrimes Research- Post Review V3.1

    Report number: ol. 6, no. 2, pp. 89-104

    Journal ref: JISCR 2023

  8. arXiv:2304.13498  [pdf

    cs.IT

    Network Coding Power Control Mechanisms for Time Varying Channels

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we propose a model for large scale fading channels via markov process. We exploit the channel delay profile and the dependency between channel states via a first order autoregressive model that cast insight to the channel variations under fading and the closed form delay induced. We propose a network-coding structure that can be employed to compensate for the channel variations unde… ▽ More

    Submitted 5 January, 2023; originally announced April 2023.

  9. arXiv:2303.06017  [pdf

    eess.SP cs.IT

    Information Theoretic I-MMSE generalize Time-Frequency Signal Processing Tools

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we capitalize on information theoretic-estimation theoretic result, called the I-MMSE [1]-[2] to show that such tool generalizes time-frequency signal processing tools urgent for the analysis of non-stationary non-Gaussian signals.

    Submitted 5 January, 2023; originally announced March 2023.

  10. Detection of road traffic crashes based on collision estimation

    Authors: Mohamed Essam, Nagia M. Ghanem, Mohamed A. Ismail

    Abstract: This paper introduces a framework based on computer vision that can detect road traffic crashes (RCTs) by using the installed surveillance/CCTV camera and report them to the emergency in real-time with the exact location and time of occurrence of the accident. The framework is built of five modules. We start with the detection of vehicles by using YOLO architecture; The second module is the tracki… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: 11 pages , 9 figures

    Journal ref: ICDIPV (CS & IT) , 2022

  11. arXiv:2204.01090  [pdf, other

    cs.LG cs.CR

    Breaking the De-Pois Poisoning Defense

    Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq

    Abstract: Attacks on machine learning models have been, since their conception, a very persistent and evasive issue resembling an endless cat-and-mouse game. One major variant of such attacks is poisoning attacks which can indirectly manipulate an ML model. It has been observed over the years that the majority of proposed effective defense models are only effective when an attacker is not aware of them bein… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

  12. arXiv:2112.11873  [pdf, other

    cs.DC cs.LG cs.MA

    FLoBC: A Decentralized Blockchain-Based Federated Learning Framework

    Authors: Mohamed Ghanem, Fadi Dawoud, Habiba Gamal, Eslam Soliman, Hossam Sharara, Tamer El-Batt

    Abstract: The rapid expansion of data worldwide invites the need for more distributed solutions in order to apply machine learning on a much wider scale. The resultant distributed learning systems can have various degrees of centralization. In this work, we demonstrate our solution FLoBC for building a generic decentralized federated learning system using blockchain technology, accommodating any machine lea… ▽ More

    Submitted 6 October, 2022; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: BSc Computer Engineering Thesis [AUC, Spring 21]

  13. arXiv:2112.11824  [pdf, ps, other

    cs.CV

    Binary Image Skeletonization Using 2-Stage U-Net

    Authors: Mohamed A. Ghanem, Alaa A. Anani

    Abstract: Object Skeletonization is the process of extracting skeletal, line-like representations of shapes. It provides a very useful tool for geometric shape understanding and minimal shape representation. It also has a wide variety of applications, most notably in anatomical research and activity detection. Several mathematical algorithmic approaches have been developed to solve this problem, and some of… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: Computer Vision Course Project [AUC, Spring 21]

  14. arXiv:2112.11769  [pdf, other

    cs.CC cs.CL

    On Theoretical Complexity and Boolean Satisfiability

    Authors: Mohamed Ghanem, Dauod Siniora

    Abstract: Theoretical complexity is a vital subfield of computer science that enables us to mathematically investigate computation and answer many interesting queries about the nature of computational problems. It provides theoretical tools to assess time and space requirements of computations along with assessing the difficultly of problems - classifying them accordingly. It also garners at its core one of… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: Undergraduate Math Survey Thesis

  15. arXiv:2110.01213  [pdf, other

    cs.DS cs.IR cs.SI physics.soc-ph

    Clique percolation method: memory efficient almost exact communities

    Authors: Alexis Baudin, Maximilien Danisch, Sergey Kirgizov, Clémence Magnien, Marwan Ghanem

    Abstract: Automatic detection of relevant groups of nodes in large real-world graphs, i.e. community detection, has applications in many fields and has received a lot of attention in the last twenty years. The most popular method designed to find overlap** communities (where a node can belong to several communities) is perhaps the clique percolation method (CPM). This method formalizes the notion of commu… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 15 pages, 5 figures, 1 table

  16. arXiv:2005.09111  [pdf, other

    cs.CE math.OC

    Topology optimization of nonlinear periodically microstructured materials for tailored homogenized constitutive properties

    Authors: Reza Behrou, Maroun Abi Ghanem, Brianna C. Macnider, Vimarsh Verma, Ryan Alvey, **ho Hong, Ashley F. Emery, Hyunsun Alicia Kim, Nicholas Boechler

    Abstract: A topology optimization method is presented for the design of periodic microstructured materials with prescribed homogenized nonlinear constitutive properties over finite strain ranges. The mechanical model assumes linear elastic isotropic materials, geometric nonlinearity at finite strain, and a quasi-static response. The optimization problem is solved by a nonlinear programming method and the se… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

  17. Interoperable Framework to Enhance Citizen Services in the Kingdom of Bahrain

    Authors: Mohammed Ghanem, Ali Alsoufi

    Abstract: Citizen records are scattered between different state organizations. It wastes time, effort, and resources for both citizen and organization to collect, maintain, and update records to fulfill citizen services. Interoperability is a key element that enables seamless collaboration between different entities. It requires non-conventional methods to overcome interoperability challenges such as lack o… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

    Comments: 4 pages, 1 figure, conference paper, 978-1-7281-3012-5/19/$31.00 \c{opyright}2019 IEEE

    Journal ref: International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), University of Bahrain, Kingdom of Bahrain, September 2019

  18. arXiv:1809.03937  [pdf, ps, other

    cs.IT

    MIMO Mutli-Cell Processing: Optimal Precoding and Power Allocation

    Authors: Samah A. M. Ghanem

    Abstract: We investigate the optimal power allocation and optimal precoding for a cluster of two BSs which cooperate to jointly maximize the achievable rate for two users connecting to each BS in a MCP framework. This framework is modeled by a virtual network MIMO channel due to the framework of full cooperation. In particular, due to sharing the CSI and data between the two BSs over the backhaul link. We p… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 10 pages, 6 figures, submitted

  19. arXiv:1809.03629  [pdf, ps, other

    cs.IT

    Network Coded Handover in IEEE 802.11

    Authors: Samah A. M. Ghanem

    Abstract: We propose a network coded handover of a station moving between two IEEE 802.11 access points (AP). To address such novel proposed framework on a small cell WiFi to WiFi AP handoff, we propose a novel model for the Distributed Coordination Function (DCF) of the WiFi IEEE 802.11 with fixed average contention window. We provide a single packet tranmission model which has been extended to N-packets t… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

    Comments: 20 pages; 4 figures, submitted

  20. arXiv:1704.05916  [pdf, ps, other

    cs.IT

    Piggybacking Codes for Network Coding: The High/Low SNR Regime

    Authors: Samah A. M. Ghanem

    Abstract: We propose a piggybacking scheme for network coding where strong source inputs piggyback the weaker ones, a scheme necessary and sufficient to achieve the cut-set upper bound at high/low-snr regime, a new asymptotically optimal operational regime for the multihop Amplify and Forward (AF) networks.

    Submitted 19 April, 2017; originally announced April 2017.

  21. arXiv:1704.04790  [pdf, ps, other

    cs.IT

    Network Coding Channel Virtualization Schemes for Satellite Multicast Communications

    Authors: Samah A. M. Ghanem, Ala Eddine Gharsellaoui, Daniele Tarchi, Alessandro Vanelli-Coralli

    Abstract: In this paper, we propose two novel schemes to solve the problem of finding a quasi-optimal number of coded packets to multicast to a set of independent wireless receivers suffering different channel conditions. In particular, we propose two network channel virtualization schemes that allow for representing the set of intended receivers in a multicast group to be virtualized as one receiver. Such… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

  22. Energy Efficient Adaptive Network Coding Schemes for Satellite Communications

    Authors: Ala Eddine Gharsellaoui, Samah A. M. Ghanem, Daniele Tarchi, Alessandro Vanelli Coralli

    Abstract: In this paper, we propose novel energy efficient adaptive network coding and modulation schemes for time variant channels. We evaluate such schemes under a realistic channel model for open area environments and Geostationary Earth Orbit (GEO) satellites. Compared to non-adaptive network coding and adaptive rate efficient network-coded schemes for time variant channels, we show that our proposed sc… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

    Comments: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 24 March 2017

  23. Adaptive Network Coding Schemes for Satellite Communications

    Authors: Ala Eddine Gharsellaoui, Samah A. M. Ghanem, Daniele Tarchi, Alessandro Vanelli-Coralli

    Abstract: In this paper, we propose two novel physical layer aware adaptive network coding and coded modulation schemes for time variant channels. The proposed schemes have been applied to different satellite communications scenarios with different Round Trip Times (RTT). Compared to adaptive network coding, and classical non-adaptive network coding schemes for time variant channels, as benchmarks, the prop… ▽ More

    Submitted 15 April, 2017; originally announced April 2017.

    Comments: IEEE Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2016

  24. arXiv:1610.09247  [pdf, ps, other

    cs.IT

    Generalized I-MMSE for K-User Gaussian Channels

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we generalize the fundamental relation between the mutual information and the minimum mean squared error (MMSE) by Guo, Shamai, and Verdu [1] to K-User Gaussian channels. We prove that the derivative of the multiuser mutual information with respect to the signal to noise ratio (SNR) is equal to the total MMSE plus a covariance term with respect to the cross correlation of the multiu… ▽ More

    Submitted 19 April, 2017; v1 submitted 28 October, 2016; originally announced October 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1504.06884

  25. arXiv:1608.05380  [pdf, other

    cs.IR cs.SI

    Exploring Trust-Aware Neighbourhood in Trust-based Recommendation

    Authors: Amira Ghenai, Moustafa M. Ghanem

    Abstract: Traditional Recommender Systems (RS) do not consider any personal user information beyond rating history. Such information, on the other hand, is widely available on social networking sites (Facebook, Twitter). As a result, social networks have recently been used in recommendation systems. In this paper, we propose an efficient method for incorporating social signals into the recommendation proces… ▽ More

    Submitted 18 August, 2016; originally announced August 2016.

    ACM Class: H.3.3

  26. Network Coding: Connections Between Information Theory And Estimation Theory

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we prove the existence of fundamental relations between information theory and estimation theory for network-coded flows. When the network is represented by a directed graph G=(V, E) and under the assumption of uncorrelated noise over information flows between the directed links connecting transmitters, switches (relays), and receivers. We unveil that there yet exist closed-form rel… ▽ More

    Submitted 26 January, 2016; v1 submitted 3 November, 2015; originally announced December 2015.

    Comments: IEEE Wireless Communications and Networking Conference (WCNC), April, 2016

  27. arXiv:1504.06884  [pdf, ps, other

    cs.IT

    Multiuser I-MMSE

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual information with respect to the signal to noise ratio (SNR) is equal to the MMSE plus a covariance induced due to the interference, quantified by a term with respect to the cross correlation… ▽ More

    Submitted 23 March, 2017; v1 submitted 26 April, 2015; originally announced April 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1411.0446

  28. arXiv:1411.0594  [pdf, ps, other

    cs.IT

    Multi-Cell Processing with Limited Cooperation: A Novel Framework to Timely Designs and Reduced CSI Feedback with General Inputs

    Authors: Samah A. M. Ghanem

    Abstract: We investigate the optimal power allocation and optimal precoding for a multi-cell-processing (MCP) framework with limited cooperation. In particular, we consider two base stations(BSs) which maximize the achievable rate for two users connecting to each BS and sharing channel state information (CSI). We propose a two way channel estimation or prediction process. Such framework has promising outcom… ▽ More

    Submitted 11 January, 2016; v1 submitted 3 November, 2014; originally announced November 2014.

    Comments: Submitted to IEEE Transactions on Signal Processing, 2015

  29. arXiv:1411.0446  [pdf, ps, other

    cs.IT

    Multiple Access Gaussian Channels with Arbitrary Inputs: Optimal Precoding and Power Allocation

    Authors: Samah A. M. Ghanem

    Abstract: In this paper, we derive new closed-form expressions for the gradient of the mutual information with respect to arbitrary parameters of the two-user multiple access channel (MAC). The derived relations generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual informa… ▽ More

    Submitted 6 November, 2014; v1 submitted 3 November, 2014; originally announced November 2014.

  30. arXiv:1405.3507  [pdf, ps, other

    cs.IT

    Secure Data Transmission in Cooperative Modes: Relay and MAC

    Authors: Samah A. M. Ghanem, Munnujahan Ara

    Abstract: Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

    Comments: 11 pages, 8 figures

  31. VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering

    Authors: Karim M. Mohamed, Mohamed A. Ismail, Nagia M. Ghanem

    Abstract: In this paper, we present VSCAN, a novel approach for generating static video summaries. This approach is based on a modified DBSCAN clustering algorithm to summarize the video content utilizing both color and texture features of the video frames. The paper also introduces an enhanced evaluation method that depends on color and texture features. Video Summaries generated by VSCAN are compared with… ▽ More

    Submitted 1 May, 2014; originally announced May 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1401.3590 by other authors without attribution