Skip to main content

Showing 1–7 of 7 results for author: Felemban, M

.
  1. arXiv:2502.02720  [pdf, other

    cs.CR

    Risk-Aware Sensitive Property-Driven Resource Management in Cloud Datacenters

    Authors: Muhamad Felemban, Abdulrahman Almutairi, Arif Ghafoor

    Abstract: Organizations are increasingly moving towards the cloud computing paradigm, in which an on-demand access to a pool of shared configurable resources is provided. However, security challenges, which are particularly exacerbated by the multitenancy and virtualization features of cloud computing, present a major obstacle. In particular, sharing of resources among potentially untrusted tenants in acces… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  2. arXiv:2501.11167  [pdf, other

    cs.LG cs.IT

    Federated Testing (FedTest): A New Scheme to Enhance Convergence and Mitigate Adversarial Attacks in Federating Learning

    Authors: Mustafa Ghaleb, Mohanad Obeed, Muhamad Felemban, Anas Chaaban, Halim Yanikomeroglu

    Abstract: Federated Learning (FL) has emerged as a significant paradigm for training machine learning models. This is due to its data-privacy-preserving property and its efficient exploitation of distributed computational resources. This is achieved by conducting the training process in parallel at distributed users. However, traditional FL strategies grapple with difficulties in evaluating the quality of r… ▽ More

    Submitted 19 January, 2025; originally announced January 2025.

  3. File Fragment Classification using Light-Weight Convolutional Neural Networks

    Authors: Mustafa Ghaleb, Kunwar Saaim, Muhamad Felemban, Saleh Al-Saleh, Ahmad Al-Mulhem

    Abstract: In digital forensics, file fragment classification is an important step toward completing file carving process. There exist several techniques to identify the type of file fragments without relying on meta-data, such as using features like header/footer and N-gram to identify the fragment type. Recently, convolutional neural network (CNN) models have been used to build classification models to ach… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 11 pages, 17 figures

    Journal ref: IEEE Access.12. (2024) 157179-157191

  4. arXiv:2003.12598  [pdf, other

    cs.CR

    A Security and Performance Driven Architecture for Cloud Data Centers

    Authors: Muhamad Felemban, Anas Daghistani, Yahya Javeed, Jason Kobes, Arif Ghafoor

    Abstract: With the growing cyber-security threats, ensuring the security of data in Cloud data centers is a challenging task. A prominent type of attack on Cloud data centers is data tampering attack that can jeopardize the confidentiality and the integrity of data. In this article, we present a security and performance driven architecture for these centers that incorporates an intrusion management system f… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

  5. arXiv:1901.03018  [pdf

    eess.SY

    A Partition-Driven Integrated Security Architecture for Cyber-Physical Systems

    Authors: Yahya Javed, Muhamad Felemban, Tawfeeq Shawly, Jason Kobes, Arif Ghafoor

    Abstract: Emerging cyber-physical systems incorporate systems of systems that have functional interdependencies. With the increase in complexity of the cyber-physical systems, the attack surface also expands, making cyber-physical systems more vulnerable to cyber-attacks. The functional interdependencies exacerbate the security risk as a cyber-attack that compromises one constituent system of a cyber-physic… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

  6. arXiv:1810.02061  [pdf, other

    cs.CR

    Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems

    Authors: Muhamad Felemban, Yahya Javeed, Jason Kobes, Thamir Qadah, Arif Ghafoor, Walid Aref

    Abstract: Data-intensive applications exhibit increasing reliance on Database Management Systems (DBMSs, for short). With the growing cyber-security threats to government and commercial infrastructures, the need to develop high resilient cyber systems is becoming increasingly important. Cyber-attacks on DBMSs include intrusion attacks that may result in severe degradation in performance. Several efforts hav… ▽ More

    Submitted 5 October, 2018; v1 submitted 4 October, 2018; originally announced October 2018.

  7. arXiv:1809.10998  [pdf, other

    cs.NI cs.MM

    GroupCast: Preference-Aware Cooperative Video Streaming with Scalable Video Coding

    Authors: Anis Elgabli, Muhamad Felemban, Vaneet Aggarwal

    Abstract: In this paper, we propose a preference-aware cooperative video streaming system for videos encoded using Scalable Video Coding (SVC) where all the collaborating users are interested in watching a video together on a shared screen. However, each user's willingness to cooperate is subject to her own constraints such as user data plans and/or energy consumption. Using SVC, each layer of every chunk c… ▽ More

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 17 pages