Skip to main content

Showing 1–10 of 10 results for author: Benkhelifa, E

.
  1. arXiv:2504.08480  [pdf, other

    cs.CR

    Toward Realistic Adversarial Attacks in IDS: A Novel Feasibility Metric for Transferability

    Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini

    Abstract: Transferability-based adversarial attacks exploit the ability of adversarial examples, crafted to deceive a specific source Intrusion Detection System (IDS) model, to also mislead a target IDS model without requiring access to the training data or any internal model parameters. These attacks exploit common vulnerabilities in machine learning models to bypass security measures and compromise system… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  2. arXiv:2501.03898  [pdf

    cs.CR cs.NI cs.OS

    SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory

    Authors: Arslan Tariq Syed, Mohamed Chahine Ghanem, Elhadj Benkhelifa, Fauzia Idrees Abro

    Abstract: The increasing sophistication of modern cyber threats, particularly file-less malware relying on living-off-the-land techniques, poses significant challenges to traditional detection mechanisms. Memory forensics has emerged as a crucial method for uncovering such threats by analysing dynamic changes in memory. This research introduces SPECTRE (Snapshot Processing, Emulation, Comparison, and Threat… ▽ More

    Submitted 7 January, 2025; originally announced January 2025.

    Comments: 23 Version 2.1

  3. arXiv:2303.13943  [pdf

    cs.CY

    Evaluating the impact of government Cyber Security initiatives in the UK

    Authors: Adejoke T. Odebade, Elhadj Benkhelifa

    Abstract: Cyber security initiatives provide immense opportunities for governments to educate, train, create awareness, and promote cyber hygiene among businesses and the general public. Creating and promoting these initiatives are necessary steps governments take to ensure the cyber health of a nation. To ensure users are safe and confident, especially online, the UK government has created initiatives desi… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 23cpages, 14 figures

  4. arXiv:2303.13938  [pdf

    cs.CY

    A Comparative Study of National Cyber Security Strategies of ten nations

    Authors: Adejoke T. Odebade, Elhadj Benkhelifa

    Abstract: This study compares the National Cybersecurity Strategies (NCSSs) of publicly available documents of ten nations across Europe (United Kingdom, France, Lithuania, Estonia, Spain, and Norway), Asia-Pacific (Singapore and Australia), and the American region (the United States of America and Canada). The study observed that there is not a unified understanding of the term "Cybersecurity"; however, a… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 28 pages, 2 figures

  5. arXiv:2211.10250  [pdf, ps, other

    cs.NE cs.AI cs.LG

    HiveNAS: Neural Architecture Search using Artificial Bee Colony Optimization

    Authors: Mohamed Shahawy, Elhadj Benkhelifa

    Abstract: The traditional Neural Network-development process requires substantial expert knowledge and relies heavily on intuition and trial-and-error. Neural Architecture Search (NAS) frameworks were introduced to robustly search for network topologies, as well as facilitate the automated development of Neural Networks. While some optimization approaches -- such as Genetic Algorithms -- have been extensive… ▽ More

    Submitted 15 June, 2023; v1 submitted 18 November, 2022; originally announced November 2022.

    ACM Class: I.2.0; G.1.6; I.2.2; G.3; I.2.11

  6. Exploring the Intersection between Neural Architecture Search and Continual Learning

    Authors: Mohamed Shahawy, Elhadj Benkhelifa, David White

    Abstract: Despite the significant advances achieved in Artificial Neural Networks (ANNs), their design process remains notoriously tedious, depending primarily on intuition, experience and trial-and-error. This human-dependent process is often time-consuming and prone to errors. Furthermore, the models are generally bound to their training contexts, with no considerations to their surrounding environments.… ▽ More

    Submitted 15 June, 2023; v1 submitted 11 June, 2022; originally announced June 2022.

    MSC Class: 68T07 ACM Class: I.2.2; D.1.2; I.2.6

  7. arXiv:2009.02805  [pdf, other

    eess.IV cs.CV

    The 2ST-UNet for Pneumothorax Segmentation in Chest X-Rays using ResNet34 as a Backbone for U-Net

    Authors: Ayat Abedalla, Malak Abdullah, Mahmoud Al-Ayyoub, Elhadj Benkhelifa

    Abstract: Pneumothorax, also called a collapsed lung, refers to the presence of the air in the pleural space between the lung and chest wall. It can be small (no need for treatment), or large and causes death if it is not identified and treated on time. It is easily seen and identified by experts using a chest X-ray. Although this method is mostly error-free, it is time-consuming and needs expert radiologis… ▽ More

    Submitted 6 September, 2020; originally announced September 2020.

  8. arXiv:2006.15469  [pdf, other

    eess.SP cs.AI cs.AR cs.SD eess.AS

    End-to-End AI-Based Point-of-Care Diagnosis System for Classifying Respiratory Illnesses and Early Detection of COVID-19

    Authors: Abdelkader Nasreddine Belkacem, Sofia Ouhbi, Abderrahmane Lakas, Elhadj Benkhelifa, Chao Chen

    Abstract: Respiratory symptoms can be a caused by different underlying conditions, and are often caused by viral infections, such as Influenza-like illnesses or other emerging viruses like the Coronavirus. These respiratory viruses, often, have common symptoms, including coughing, high temperature, congested nose, and difficulty breathing. However, early diagnosis of the type of the virus, can be crucial, e… ▽ More

    Submitted 27 June, 2020; originally announced June 2020.

  9. arXiv:2006.13893  [pdf

    cs.CY cs.DC

    A Cloud Computing Capability Model for Large-Scale Semantic Annotation

    Authors: Oluwasegun Adedugbe, Elhadj Benkhelifa, Anoud Bani-Hani

    Abstract: Semantic technologies are designed to facilitate context-awareness for web content, enabling machines to understand and process them. However, this has been faced with several challenges, such as disparate nature of existing solutions and lack of scalability in proportion to web scale. With a holistic perspective to web content semantic annotation, this paper focuses on leveraging cloud computing… ▽ More

    Submitted 24 January, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

  10. arXiv:2005.07136  [pdf, other

    cs.DC cs.NI

    Latency-Sensitive Web Service Workflows: A Case for a Software-Defined Internet

    Authors: Pradeeban Kathiravelu, Peter Van Roy, Luís Veiga, Elhadj Benkhelifa

    Abstract: The Internet, at large, remains under the control of service providers and autonomous systems. The Internet of Things (IoT) and edge computing provide an increasing demand and potential for more user control for their web service workflows. Network Softwarization revolutionizes the network landscape in various stages, from building, incrementally deploying, and maintaining the environment. Softwar… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Accepted for Publication at The Seventh International Conference on Software Defined Systems (SDS-2020)