Search
Now showing items 1-10 of 16
Robotic probe positioning system for structural health monitoring
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
SpiralSRA: A threat-specific security risk assessment framework for the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
Visualization as a mean of big data management: Using Qatar's electricity consumption data
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
Stateless Security Risk Assessment for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
Short survey of techniques for visualizing events recorded in logs
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
Deep learning for detection of routing attacks in the internet of things
(
Atlantis Press
, 2018 , Article)
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
Image Stitching System With Scanning Microscopy for Histopathological Applications
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
Framework for Visualizing Browsing Patterns Captured in Computer Logs
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...