Researches

  • Researches
Article

Impact of portable executable header features on malware detection accuracy

Published in: Computers, Materials & Continua

Sep 22, 2022

Hasan H. Al-khshali Muhammad Ilyas

One aspect of cybersecurity incorporates the study of Portable Executable (PE) file maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations; this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized d...


Article

Multiple Object Tracking in Robotic Applications: Trends and Challenges

Published in: Applied Sciences Journal

Sep 20, 2022

The recent advancement in autonomous robotics is directed toward designing a reliable system that can detect and track multiple objects in the surrounding environment for navigation and guidance purposes. This paper aims to survey the recent development in this area and present the latest trends that tackle the challenges of multiple object tracking, such as heavy occlusion, dynamic background, and illumination changes. Our research includes Multiple Object Tracking (MOT) methods incorpora...


Article

The role of artificial intelligence, marketing strategies, and organizational capabilities in organizational performance: The moderating role of organizational behavior

Published in: Uncertain Supply Chain Management

Sep 15, 2022

/ Mohammed Nuseir / Ghaleb El Refae

Currently, artificial intelligence and marketing strategies have become significant factors for improving the business capabilities that lead to improved business performance. Thus, the current study investigates the impacts of artificial intelligence and marketing strategies on the organizational performance of the tourism industry in the UAE. The present study also examines the mediating role of organizational capabilities in linking artificial intelligence, marketing strategies, and organiza...


Article

The Impact of COVID-19 on General Rights and Freedoms: The Jordanian Case as a Model

Published in: Academic Journal of Interdisciplinary StudiesOpen AccessVolume 11, Issue 5, Pages 125 - 138September 2022

Sep 02, 2022

The study addressed the impact of COVID-19 on public rights and freedoms. The research question is to what extent it is possible to achieve compatibility between preserving public health in light of the COVID-19 pandemic and protecting the basic rights and freedoms of individuals, and how the Jordanian government dealt with the pandemic by resorting to exceptional legislation in this regard. To address this problem the study focused on the legislative basis which the Jordanian government relied...


Article

Test case prioritization for model transformations

Published in: Journal of King Saud University - Computer and Information Sciences

Sep 01, 2022

/ Saqib Iqbal / Issam Al-Azzoni

The application of model transformations is a critical component in Model-Driven Engineering (MDE). To ensure the correctness of the generated models, these model transformations need to be extensively tested. However, during the regression testing of these model transformations, it becomes too costly to frequently run a large number of test cases. Test case prioritization techniques are needed to rank the test cases and help the tester during the regression testing to be more efficient. The ob...


Article

A taxonomy of IoT firmware security and principal firmware analysis techniques

Published in: International Journal of Critical Infrastructure Protection

Sep 01, 2022

Ibrahim Nadir / Haroon Mahmood Ghalib Asadullah

Internet of Things (IoT) has come a long way since its inception. However, the standardization process in IoT systems for a secure IoT solution is still in its early days. Numerous quality review articles have been contributed by researchers on existing frameworks, architectures, as well as the threats to IoT on different layers. However, most of the existing work neglects the security aspects of firmware in the IoT ecosystem. As such, there is a lack of comprehensive survey on IoT firmware sec...

Displaying 431-436 of 749 result(s).
Best-Fit Major?
Call Now
Chat Now

Copyright © 2026 Al Ain University. All Rights Reserved.