Alert button
Picture for MohammadNoor Injadat

MohammadNoor Injadat

Alert button

Optimized Ensemble Model Towards Secured Industrial IoT Devices

Add code
Bookmark button
Alert button
Jan 10, 2024
MohammadNoor Injadat

Viaarxiv icon

Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities

Add code
Bookmark button
Alert button
Jan 11, 2021
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Figure 1 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 2 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 3 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Figure 4 for Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities
Viaarxiv icon

Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules

Add code
Bookmark button
Alert button
Dec 25, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

Figure 1 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Figure 2 for Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules
Viaarxiv icon

DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach

Add code
Bookmark button
Alert button
Dec 25, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya

Figure 1 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 2 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 3 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Figure 4 for DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach
Viaarxiv icon

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Add code
Bookmark button
Alert button
Dec 16, 2020
MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami

Figure 1 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 2 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Figure 3 for Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Viaarxiv icon

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Add code
Bookmark button
Alert button
Dec 16, 2020
Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami

Figure 1 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 2 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 3 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Figure 4 for Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Viaarxiv icon

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Add code
Bookmark button
Alert button
Aug 09, 2020
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Figure 1 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 2 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 3 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Figure 4 for Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
Viaarxiv icon

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Add code
Bookmark button
Alert button
Aug 05, 2020
MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami

Figure 1 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 2 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 3 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Figure 4 for Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
Viaarxiv icon

Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining

Add code
Bookmark button
Alert button
Jun 09, 2020
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami

Figure 1 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 2 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 3 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Figure 4 for Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining
Viaarxiv icon

Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review

Add code
Bookmark button
Alert button
May 23, 2020
Fadi Salo, MohammadNoor Injadat, Ali Bou Nassif, Aleksander Essex

Figure 1 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 2 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 3 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Figure 4 for Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
Viaarxiv icon