Skip to main content

Showing 1–4 of 4 results for author: Alani, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03335  [pdf, other

    cs.CR cs.AI

    Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions

    Authors: Naseem Khan, Kashif Ahmad, Aref Al Tamimi, Mohammed M. Alani, Amine Bermak, Issa Khalil

    Abstract: Industry 5.0, which focuses on human and Artificial Intelligence (AI) collaboration for performing different tasks in manufacturing, involves a higher number of robots, Internet of Things (IoTs) devices and interconnections, Augmented/Virtual Reality (AR), and other smart devices. The huge involvement of these devices and interconnection in various critical areas, such as economy, health, educatio… ▽ More

    Submitted 21 July, 2024; originally announced August 2024.

    Comments: 57 pages, 6 figures

  2. arXiv:2310.00070  [pdf, other

    cs.CR

    Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems

    Authors: Mohammed M. Alani, Atefeh Mashatan, Ali Miri

    Abstract: Botnet detection based on machine learning have witnessed significant leaps in recent years, with the availability of large and reliable datasets that are extracted from real-life scenarios. Consequently, adversarial attacks on machine learning-based cybersecurity systems are posing a significant threat to the practicality of these solutions. In this paper, we introduce a novel attack that utilize… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

  3. Applications of Machine Learning in Cryptography: A Survey

    Authors: Mohammed M. Alani

    Abstract: Machine learning techniques have had a long list of applications in recent years. However, the use of machine learning in information and network security is not new. Machine learning and cryptography have many things in common. The most apparent is the processing of large amounts of data and large search spaces. In its varying techniques, machine learning has been an interesting field of study wi… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  4. arXiv:1812.03314  [pdf, ps, other

    cs.CR

    IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks

    Authors: Mohammed M. Alani

    Abstract: The number of IoT devices in use is increasing rapidly and so is the number of IoT applications. As in any new technology, the rapid development means rapid increase in security threats and attack surfaces. IoT security has proven to be challenging throughout the past few years. However, another challenging task is to prevent IoT devices from becoming a tool used by malicious attackers to break in… ▽ More

    Submitted 8 December, 2018; originally announced December 2018.

    Comments: This is a pre-print version of the paper. The original paper is published by the ACM as part of the proceedings of the 2018 The 6th International Conference on Information Technology: IoT and Smart City (ICIT 2018)