• Dynamic security metrics for measuring the effectiveness of moving target defense techniques 

      Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors ( Elsevier Ltd , 2018 , Article)
      Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
    • QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol 

      Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications 

      Mhaisen N.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Elsevier B.V. , 2020 , Article)
      Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Unsupervised Technique for Anomaly Detection in Qatar Stock Market 

      Al-Thani H.; Hassen H.; Al-Maadced S.; Fetais N.; Jaoua A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The aim of anomaly detection is to find patterns or data points that are not confirming the expected behavior inside the dataset. Techniques from a variety of disciplines like machine learning, statistics, information ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...