M. Omar Al-Kadri

Orcid: 0000-0002-1146-1860

According to our database1, M. Omar Al-Kadri authored at least 31 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks.
Comput. Networks, December, 2023

AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey.
ACM Comput. Surv., November, 2023

Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring.
Comput. Secur., October, 2023

Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system.
J. Inf. Secur. Appl., September, 2023

Android Source Code Vulnerability Detection: A Systematic Literature Review.
ACM Comput. Surv., 2023

Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

RRP: A Reliable Reinforcement Learning Based Routing Protocol for Wireless Medical Sensor Networks.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.
Proceedings of the Security and Privacy in Communication Networks, 2022

AI-Powered Vulnerability Detection for Secure Source Code Development.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

A Robust Exploration Strategy in Reinforcement Learning Based on Temporal Difference Error.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Resource Efficient Federated Deep Learning for IoT Security Monitoring.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
A survey on wireless body area networks: architecture, security challenges and research opportunities.
Comput. Secur., 2021

TrustMod: A Trust Management Module For NS-3 Simulator.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Memory Efficient Federated Deep Learning for Intrusion Detection in IoT Networks.
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021

Resource Efficient Boosting Method for IoT Security Monitoring.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
X-FDR: A Cross-Layer Routing Protocol for Multihop Full-Duplex Wireless Networks.
IEEE Wirel. Commun., 2019

Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus.
Proceedings of the ACM Computer Science in Cars Symposium, 2019

2018
X-FDR: A Cross-Layer Routing Protocol for Multi-hop Full-Duplex Wireless Networks.
CoRR, 2018

2017
Full-Duplex Small Cells for Next Generation Heterogeneous Cellular Networks: A Case Study of Outage and Rate Coverage Analysis.
IEEE Access, 2017

2016
An Energy-Efficient Full-Duplex MAC Protocol for Distributed Wireless Networks.
IEEE Wirel. Commun. Lett., 2016

Outage Probability of Heterogeneous Cellular Networks with Full-Duplex Small Cells.
Proceedings of the 2016 IEEE Global Communications Conference, 2016


  Loading...