• Advancing Data Center Networks: A Focus on Energy and Cost Efficiency 

      Chkirbene, Zina; Hamila, Ridha; Al-Dweik, Arafat; Khattab, Tamer ( IEEE , 2023 , Article)
      Data centers serve as the backbone for cloud computing, enterprise services, and infrastructure-based offerings. One area of ongoing research in data center networking focuses on innovating new topologies for large-scale ...
    • Deep Reinforcement Learning for Network Selection over Heterogeneous Health Systems 

      Chkirbene, Zina; Abdellatif, Alaa Awad; Mohamed, Amr; Erbad, Aiman; Guizani, Mohsen ( IEEE Computer Society , 2022 , Article)
      Smart health systems improve our quality oflife by integrating diverse information and technologies into health and medical practices. Such technologies can significantly improve the existing health services. However, ...
    • Hybrid Machine Learning for Network Anomaly Intrusion Detection 

      Chkirbene, Zina; Eltanbouly, Sohaila; Bashendy, May; Alnaimi, Noora; Erbad, Aiman ( IEEE , 2020 , Conference Paper)
      In this paper, a hybrid approach of combing two machine learning algorithms is proposed to detect the different possible attacks by performing effective feature selection and classification. This system uses Random Forest ...
    • Machine Learning Techniques for Network Anomaly Detection: A Survey 

      Eltanbouly, Sohaila; Bashendy, May; Alnaimi, Noora; Chkirbene, Zina; Erbad, Aiman ( IEEE , 2020 , Conference Paper)
      Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit ...
    • Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman ( IEEE , 2023 , Conference Paper)
      The Wireless Sensor Networks (WSN) are designed to remotely monitor and control specific physical or environmental conditions. However, due to the open nature of WSN, many threats and attacks may arise by malicious users ...