Nour Moustafa

Orcid: 0000-0001-6127-9349

According to our database1, Nour Moustafa authored at least 127 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications.
IEEE Internet Things J., February, 2024

Explainable deep learning for attack intelligence and combating cyber-physical attacks.
Ad Hoc Networks, February, 2024

A threat intelligence framework for protecting smart satellite-based healthcare networks.
Neural Comput. Appl., January, 2024

Cybersecurity when working from home during COVID-19: considering the human factors.
J. Cybersecur., January, 2024

2023
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities.
Sensors, September, 2023

An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks.
Neural Comput. Appl., September, 2023

An explainable deep learning-enabled intrusion detection framework in IoT networks.
Inf. Sci., August, 2023

Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations.
IEEE J. Biomed. Health Informatics, April, 2023

DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks.
IEEE Trans. Ind. Informatics, March, 2023

The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications.
IEEE Internet Things J., February, 2023

OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships.
IEEE Trans. Sustain. Comput., 2023

AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges.
IEEE Trans. Serv. Comput., 2023

DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing.
IEEE Trans. Intell. Transp. Syst., 2023

Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach.
IEEE Trans. Ind. Informatics, 2023

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data.
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.
J. Netw. Syst. Manag., 2023

Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey.
ACM Comput. Surv., 2023

Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions.
IEEE Commun. Surv. Tutorials, 2023

Digital Forensics based on Federated Learning in IoT Environment.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
ASU/UNSW-CNATCC-001.
Dataset, February, 2022

Deep Learning Techniques for IoT Security and Privacy
Studies in Computational Intelligence 997, Springer, ISBN: 978-3-030-89024-7, 2022

Privacy-preserving big data analytics for cyber-physical systems.
Wirel. Networks, 2022

Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2022

A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics.
IEEE Trans. Intell. Transp. Syst., 2022

Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management.
IEEE Trans. Intell. Transp. Syst., 2022

An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET.
IEEE Trans. Intell. Transp. Syst., 2022

Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

AI-Driven Synthetic Biology for Non-Small Cell Lung Cancer Drug Effectiveness-Cost Analysis in Intelligent Assisted Medical Systems.
IEEE J. Biomed. Health Informatics, 2022

Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems.
IEEE J. Biomed. Health Informatics, 2022

A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach.
IEEE Trans. Ind. Informatics, 2022

An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health.
IEEE Trans. Green Commun. Netw., 2022

Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network.
IEEE Trans. Dependable Secur. Comput., 2022

An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems.
IEEE Trans. Cloud Comput., 2022

Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children.
Image Vis. Comput., 2022

Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication.
Inf. Sci., 2022

A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks.
IEEE Internet Things J., 2022

ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets.
IEEE Internet Things J., 2022

H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information.
IEEE Internet Things J., 2022

One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data.
Int. J. Intell. Syst., 2022

XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks.
Future Gener. Comput. Syst., 2022

Radial Basis Function Network with Differential Privacy.
Future Gener. Comput. Syst., 2022

Enhancing IoT anomaly detection performance for federated learning.
Digit. Commun. Networks, 2022

Rethinking maximum-margin softmax for adversarial robustness.
Comput. Secur., 2022

Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions.
IEEE Consumer Electron. Mag., 2022

A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks.
Comput. Electr. Eng., 2022

A holistic survey on the use of emerging technologies to provision secure healthcare solutions.
Comput. Electr. Eng., 2022

Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems.
Ad Hoc Networks, 2022

Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain.
IEEE Access, 2022

Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks.
IEEE Trans. Sustain. Comput., 2021

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021

Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Two-Stage Deep Learning Framework for Discrimination between COVID-19 and Community-Acquired Pneumonia from Chest CT scans.
Pattern Recognit. Lett., 2021

Fair and size-scalable participant selection framework for large-scale mobile crowdsensing.
J. Syst. Archit., 2021

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021

Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks.
CoRR, 2021

Hunter in the Dark: Discover Anomalous Network Activities Using Deep Ensemble Networks.
CoRR, 2021

Security and Privacy for Artificial Intelligence: Opportunities and Challenges.
CoRR, 2021

Towards a Standard Feature Set of NIDS Datasets.
CoRR, 2021

Mitigating the impact of adversarial attacks in very deep networks.
Appl. Soft Comput., 2021

A Data Driven Review of Board Game Design and Interactions of Their Mechanics.
IEEE Access, 2021

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021

Multi-Objective Task Scheduling Approach for Fog Computing.
IEEE Access, 2021

A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles.
IEEE Access, 2021

A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020

An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020

A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework.
Future Gener. Comput. Syst., 2020

Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective.
Trans. Emerg. Telecommun. Technol., 2020

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets.
CoRR, 2020

Enhancing network forensics with particle swarm and deep learning: The particle deep framework.
CoRR, 2020

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Comput. Secur., 2020

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports.
IEEE Access, 2020

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems.
IEEE Access, 2020

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions.
IEEE Access, 2020

NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems.
Proceedings of the Big Data Technologies and Applications, 2020

Densely Connected Residual Network for Attack Recognition.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Autonomous detection of malicious events using machine learning models in drone networks.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

A Novel Cognitive Computing Technique Using Convolutional Networks for Automating the Criminal Investigation Process in Policing.
Proceedings of the Intelligent Systems and Applications, 2020

A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks.
Proceedings of the Intelligent Systems and Applications, 2020

A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Pelican: A Deep Residual Network for Network Intrusion Detection.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems.
Proceedings of the AI 2020: Advances in Artificial Intelligence, 2020

2019
UNSW_NB15 dataset.
Dataset, October, 2019

The Bot-IoT dataset.
Dataset, October, 2019

Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019

Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks.
IEEE Trans. Big Data, 2019

A holistic review of Network Anomaly Detection Systems: A comprehensive survey.
J. Netw. Comput. Appl., 2019

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019

A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing.
CoRR, 2019

Hierarchical Adversarial Network for Human Pose Estimation.
IEEE Access, 2019

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions.
IEEE Access, 2019

Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019

2018
Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals.
IEEE Trans. Emerg. Top. Comput. Intell., 2018

Identification of malicious activities in industrial internet of things based on deep learning models.
J. Inf. Secur. Appl., 2018

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems.
IEEE Access, 2018

A digital identity stack to improve privacy in the IoT.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

A Network Forensic Scheme Using Correntropy-Variation for Attack Detection.
Proceedings of the Advances in Digital Forensics XIV, 2018

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

2017
Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic.
PhD thesis, 2017

RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis.
CoRR, 2017

A hybrid feature selection for network intrusion detection systems: Central points.
CoRR, 2017

Probability Risk Identification Based Intrusion Detection System for SCADA Systems.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Collaborative anomaly detection framework for handling big data of cloud computing.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

Privacy preservation intrusion detection technique for SCADA systems.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

2016
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
Inf. Secur. J. A Glob. Perspect., 2016

2015
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015

The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015


  Loading...