Skip to main content

Showing 1–12 of 12 results for author: Injadat, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.01655  [pdf, other

    cs.CY cs.AI cs.LG

    A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective

    Authors: Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah

    Abstract: Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students due to the shift of focus toward integrating the Internet technologies in education and the focus of academic institutions on moving toward e-Learning, blended, or online learning models.… ▽ More

    Submitted 10 January, 2024; originally announced February 2024.

    Comments: Accepted and presented in 24th International Arab Conference on Information Technology (ACIT'2023)

  2. arXiv:2401.05509  [pdf, other

    cs.CR cs.AI

    Optimized Ensemble Model Towards Secured Industrial IoT Devices

    Authors: MohammadNoor Injadat

    Abstract: The continued growth in the deployment of Internet-of-Things (IoT) devices has been fueled by the increased connectivity demand, particularly in industrial environments. However, this has led to an increase in the number of network related attacks due to the increased number of potential attack surfaces. Industrial IoT (IIoT) devices are prone to various network related attacks that can have sever… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: Accepted and presented in 24th International Arab Conference on Information Technology (ACIT'2023)

  3. Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities

    Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

    Abstract: The emergence and continued reliance on the Internet and related technologies has resulted in the generation of large amounts of data that can be made available for analyses. However, humans do not possess the cognitive capabilities to understand such large amounts of data. Machine learning (ML) provides a mechanism for humans to process large amounts of data, gain insights about the behavior of t… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Comments: 46 pages, 7 figures, 5 tables, journal

  4. Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

    Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

    Abstract: The field of e-learning has emerged as a topic of interest in academia due to the increased ease of accessing the Internet using using smart-phones and wireless devices. One of the challenges facing e-learning platforms is how to keep students motivated and engaged. Moreover, it is also crucial to identify the students that might need help in order to make sure their academic performance doesn't s… ▽ More

    Submitted 25 December, 2020; originally announced January 2021.

    Comments: 1 Table, 1 Figure, published in 2018 IEEE World Engineering Education Conference (EDUNINE)

    Journal ref: 2018 IEEE World Engineering Education Conference (EDUNINE), 2018, pp. 1-6

  5. DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

    Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

    Abstract: Domain Name System (DNS) is a crucial component of current IP-based networks as it is the standard mechanism for name to IP resolution. However, due to its lack of data integrity and origin authentication processes, it is vulnerable to a variety of attacks. One such attack is Typosquatting. Detecting this attack is particularly important as it can be a threat to corporate secrets and can be used t… ▽ More

    Submitted 25 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures, 3 tables, published in 2018 IEEE Global Communications Conference (GLOBECOM)

    Journal ref: 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1-7

  6. arXiv:2012.11326  [pdf, other

    cs.CR cs.LG cs.NI

    Optimized Random Forest Model for Botnet Detection Based on DNS Queries

    Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami

    Abstract: The Domain Name System (DNS) protocol plays a major role in today's Internet as it translates between website names and corresponding IP addresses. However, due to the lack of processes for data integrity and origin authentication, the DNS protocol has several security vulnerabilities. This often leads to a variety of cyber-attacks, including botnet network attacks. One promising solution to detec… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 4 pages, 3 figures, 1 table, Accepted and presented in IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)

  7. arXiv:2012.11325  [pdf, other

    cs.CR cs.LG cs.NI

    Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

    Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami

    Abstract: The increased reliance on the Internet and the corresponding surge in connectivity demand has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment of IoT devices has in turn led to an increase in network attacks due to the larger number of potential attack surfaces as illustrated by the recent reports that IoT malware attacks increased by 215.7% from 10.3 milli… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 4 pages, 2 figures, 1 table, Accepted and presented at IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)

  8. Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

    Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

    Abstract: Cyber-security garnered significant attention due to the increased dependency of individuals and organizations on the Internet and their concern about the security and privacy of their online activities. Several previous machine learning (ML)-based network intrusion detection systems (NIDSs) have been developed to protect against malicious online behavior. This paper proposes a novel multi-stage o… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

    Comments: 14 Pages, 13 Figures, 4 tables, Published IEEE Transactions on Network and Service Management ( Early Access )

    Journal ref: Electronic ISSN: 1932-4537

  9. arXiv:2008.02327  [pdf, other

    cs.LG cs.NI stat.ML

    Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

    Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami

    Abstract: Network attacks have been very prevalent as their rate is growing tremendously. Both organization and individuals are now concerned about their confidentiality, integrity and availability of their critical information which are often impacted by network attacks. To that end, several previous machine learning-based intrusion detection methods have been developed to secure network infrastructure fro… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 6 pages, 7 Figures, 2 tables, Published in 2018 IEEE Global Communications Conference (GLOBECOM)

  10. Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining

    Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

    Abstract: Predicting students' academic performance has been a research area of interest in recent years with many institutions focusing on improving the students' performance and the education quality. The analysis and prediction of students' performance can be achieved using various data mining techniques. Moreover, such techniques allow instructors to determine possible factors that may affect the studen… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: 29 Pages, 13 Figures, 19 Tables, Accepted in Springer's Applied Intelligence

  11. arXiv:2005.12267  [pdf, other

    cs.CR cs.AI cs.LG

    Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review

    Authors: Fadi Salo, MohammadNoor Injadat, Ali Bou Nassif, Aleksander Essex

    Abstract: Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation. The exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation has begun to pose significant challenges for data management and s… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

    Comments: 8 Pages, 5 Figures, to be appeared in the proceedings of the International Symposium on Big Data Management and Analytics. April 25-26, 2019, Calgary, Canada

  12. Systematic Ensemble Model Selection Approach for Educational Data Mining

    Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

    Abstract: A plethora of research has been done in the past focusing on predicting student's performance in order to support their development. Many institutions are focused on improving the performance and the education quality; and this can be achieved by utilizing data mining techniques to analyze and predict students' performance and to determine possible factors that may affect their final marks. To add… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: 47 Pages, 20 figures, 13 tables, accepted in Elsevier's Knowledge-Based Systems