default search action
Mohamed Chahine Ghanem
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil T. Vassilev:
A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Sci. Int. Digit. Investig. 48: 301675 (2024) - [j7]Djallel Hamouda, Mohamed Amine Ferrag, Nadjette Benhamida, Hamid Seridi, Mohamed Chahine Ghanem:
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques. Internet Things 26: 101149 (2024) - [j6]Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem:
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response. Network 4(1): 68-90 (2024) - [i8]Mohammed Ashfaaq M. Farzaan, Mohamed Chahine Ghanem, Ayman El-Hajjar, Deepthi N. Ratnayake:
AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments. CoRR abs/2404.05602 (2024) - [i7]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev:
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response. CoRR abs/2408.01999 (2024) - [i6]Fatma Yasmine Loumachi, Mohamed Chahine Ghanem:
Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models. CoRR abs/2409.02572 (2024) - 2023
- [j5]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance. IEEE Access 11: 129840-129853 (2023) - [j4]Mohamed Chahine Ghanem, Thomas M. Chen, Erivelton G. Nepomuceno:
Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks. J. Intell. Inf. Syst. 60(2): 281-303 (2023) - [j3]Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. J. Cybersecur. Priv. 3(4): 808-829 (2023) - [i5]Mohamed Chahine Ghanem, Maider D. Uribarri, Istteffanny I. Araujo, Ramzi Djemai:
The Automation of the Extraction of Evidence masked by Steganographic Techniques in WAV and MP3 Audio Files. CoRR abs/2307.07293 (2023) - [i4]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance. CoRR abs/2307.10967 (2023) - [i3]Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. CoRR abs/2309.05537 (2023) - [i2]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil T. Vassilev:
A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response. CoRR abs/2309.07064 (2023) - [i1]Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem:
A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response. CoRR abs/2312.01219 (2023) - 2020
- [j2]Mohamed Chahine Ghanem, Thomas M. Chen:
Reinforcement Learning for Efficient Network Penetration Testing. Inf. 11(1): 6 (2020)
2010 – 2019
- 2016
- [c1]Mohamed Chahine Ghanem, Deepthi N. Ratnayake:
Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol. CyberSA 2016: 1-7
1990 – 1999
- 1996
- [j1]Mohamed Chahine Ghanem, Kamal Al-Haddad, Gilles Roy:
A new control strategy to achieve sinusoidal line current in a cascade buck-boost converter. IEEE Trans. Ind. Electron. 43(3): 441-449 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint