Using Supervised Learning to Detect Command and Control Attacks in IoT
The rapid proliferation of internet of things (IoT) devices has ushered in a new era of technological development. However, this growth has also exposed these devices to various cybersecurity risks, including command and control (C&C) attacks. C&C ...
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct ...
Software Engineering for Developing a Cloud Computing Museum-Guide System
The aim of this article proposes an innovative solution for developing a museum-guide system, which employs a voice-activated assistant paired with 3-D hologram displays, that utilizes Amazon web services (AWS) to enhance the visitor experience at the ...
Detecting Ambiguities in Requirement Documents Written in Arabic Using Machine Learning Algorithms
- Ahmad Althunibat,
- Bayan Alsawareah,
- Siti Sarah Maidin,
- Belal Hawashin,
- Iqbal Jebril,
- Belal Zaqaibeh,
- Haneen A. Al-khawaja
The identification of ambiguities in Arabic requirement documents plays a crucial role in requirements engineering. This is because the quality of requirements directly impacts the overall success of software development projects. Traditionally, ...
Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System
With the advent of internet of things (IoT), new network paradigms have emerged. One such technology is cloudlets. Cloudlets are being increasingly used in various IoT-based applications such as smart homes, smart cities, healthcare, and industrial ...
A Distributed Cloud Architecture Based on General De Bruijn Overlay Network
Distributed cloud systems enable the distribution of computing resources across various geographical locations. While offering benefits like accelerated content delivery, the scalability and coherence maintenance of these systems pose significant ...
IIoT Protocols for Edge/Fog and Cloud Computing in Industrial AI: A High Frequency Perspective
Various industrial applications deal with high-frequency data. Traditionally, these systems have analyzed high-frequency data directly on the data source or at the commanding PLC. However, currently, Industry 4.0 technologies support new monitoring ...
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
- Ahmad Al-Qerem,
- Amjad Aldweesh,
- Mohammad Alauthman,
- Abdelraouf Ishtaiwi,
- Ali Mohd Ali,
- Mohammad Sabahean,
- Bilal Alzubi,
- Ammar Almomani,
- Mohammad A. Al Khaldy
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for identifying phishing websites. The efficiency of different algorithms at classifying ...