• Machine learning for the security of healthcare systems based on Internet of Things and edge computing 

      Unal, Devrim; Bennbaia, Shada; Catak, Ferhat Ozgur ( Elsevier , 2022 , Book chapter)
      Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ...
    • Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning 

      Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...