Omar A. Darwish

Orcid: 0000-0001-8346-7148

Affiliations:
  • Eastern Michigan University, Ypsilanti, MI, USA


According to our database1, Omar A. Darwish authored at least 37 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A deep learning approach for detecting covert timing channel attacks using sequential data.
Clust. Comput., April, 2024

A Survey Analysis of Internet of Things (IoT) Education Across the Top 25 Universities in the United States.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Notional Understanding of the Relationship between Code Readability and Software Complexity.
Inf., February, 2023

A survey of uncover misleading and cyberbullying on social media for public health.
Clust. Comput., 2023

Comparative Analysis Study for Air Quality Prediction in Smart Cities Using Regression Techniques.
IEEE Access, 2023

Identifying Fake News in the Russian-Ukrainian Conflict Using Machine Learning.
Proceedings of the Advanced Information Networking and Applications, 2023

A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

Comparative Analysis of Sequential and Parallel Computing for Object Detection Using Deep Learning Model.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning.
Int. J. Interact. Mob. Technol., July, 2022

Dynamic Traffic Light System to Reduce The Waiting Time of Emergency Vehicles at Intersections within IoT Environment.
Int. J. Comput. Commun. Control, March, 2022

Survey on authentication and security protocols and schemes over 5G networks.
Int. J. Distributed Sens. Networks, 2022

A Deep Learning Framework for Detection of COVID-19 Fake News on Social Media Platforms.
Data, 2022

Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation.
IEEE Access, 2022

A Platform for Automated Solar Data Analysis Using Machine Learning.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

Classifying Arabian Gulf Tweets to Detect People's Trends: A case study.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

Detecting Arabic YouTube Spam Using Data Mining Techniques.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Oplà Device in IoT Environment.
Proceedings of the 5th International Conference on Advanced Communication Technologies and Networking, 2022

Covert Timing Channels Detection Based on Image Processing Using Deep Learning.
Proceedings of the Advanced Information Networking and Applications, 2022

On developing deep learning models with particle swarm optimization in the presence of poisoning attacks.
Proceedings of the International Arab Conference on Information Technology, 2022

A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
A Classifier to Detect Informational vs. Non-Informational Heart Attack Tweets.
Future Internet, 2021

Enhancing Robots Navigation in Internet of Things Indoor Systems.
Comput., 2021

SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning.
IEEE Access, 2021

A Cloud-Based Mobile Application for Women with Gestational Diabetes.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications.
Sensors, 2020

Time-Ordered Bipartite Graph for Spatio-Temporal Social Network Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Predicting Length of Stay for Cardiovascular Hospitalizations in the Intensive Care Unit: Machine Learning Approach.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Survey of Educational Cyber Ranges.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay Prediction.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Using hierarchical statistical analysis and deep neural networks to detect covert timing channels.
Appl. Soft Comput., 2019

Source Codes Classification Using a Modified Instruction Count Pass.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
Towards a Streaming Approach to the Mitigation of Covert Timing Channels.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2015
The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Fibonacci sequence based multipath load balancing approach for mobile ad hoc networks.
Ad Hoc Networks, 2014

2009
Arabic Numerals Checker: Checking Agreement between Numerals and Counted Objects in the Arabic Language.
Int. J. Comput. Process. Orient. Lang., 2009


  Loading...