Alert button
Picture for Abdallah Shami

Abdallah Shami

Alert button

Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

Add code
Bookmark button
Alert button
Dec 25, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

Figure 1 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Figure 2 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Viaarxiv icon

DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

Add code
Bookmark button
Alert button
Dec 25, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

Figure 1 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 2 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 3 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 4 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Viaarxiv icon

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Add code
Bookmark button
Alert button
Dec 16, 2020
MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami

Figure 1 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 2 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 3 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Viaarxiv icon

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Add code
Bookmark button
Alert button
Dec 16, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami

Figure 1 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 2 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 3 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 4 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Viaarxiv icon

A Transfer Learning Framework for Anomaly Detection Using Model of Normality

Add code
Bookmark button
Alert button
Nov 12, 2020
Sulaiman Aburakhia, Tareq Tayeh, Ryan Myers, Abdallah Shami

Figure 1 for A Transfer Learning Framework for Anomaly Detection Using Model of Normality
Figure 2 for A Transfer Learning Framework for Anomaly Detection Using Model of Normality
Figure 3 for A Transfer Learning Framework for Anomaly Detection Using Model of Normality
Figure 4 for A Transfer Learning Framework for Anomaly Detection Using Model of Normality
Viaarxiv icon

Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks

Add code
Bookmark button
Alert button
Nov 10, 2020
Tareq Tayeh, Sulaiman Aburakhia, Ryan Myers, Abdallah Shami

Figure 1 for Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks
Figure 2 for Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks
Figure 3 for Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks
Figure 4 for Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks
Viaarxiv icon

Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing

Add code
Bookmark button
Alert button
Sep 04, 2020
Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami

Figure 1 for Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing
Figure 2 for Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing
Viaarxiv icon

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Add code
Bookmark button
Alert button
Aug 09, 2020
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Figure 1 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 2 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 3 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 4 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Viaarxiv icon

On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice

Add code
Bookmark button
Alert button
Aug 07, 2020
Li Yang, Abdallah Shami

Figure 1 for On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Figure 2 for On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Figure 3 for On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Figure 4 for On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Viaarxiv icon

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Add code
Bookmark button
Alert button
Aug 05, 2020
MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami

Figure 1 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 2 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 3 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 4 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Viaarxiv icon