Publications

Journal Publications

Suhare Solaiman, Emad Alsuwat & Rajwa Alharthi. (2023) “Simultaneous Tracking and Recognizing Drone Targets with Millimeter-Wave Radar and Convolutional Neural Network”, 6(4), 1 - 17. (Web of Science indexed journal)

Emad Alsuwat, Suhare Solaiman & Hatim Alsuwat, (2023). “Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing”. Computers, Materials & Continua, 75(2), 3743 - 3759. (Web of Science indexed journal)

Majed Alsafyani, Fahad Alhomayani, Hatim Alsuwat & Emad Alsuwat, (2023). “Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map”. Sensors, 23(3), 1415. (Web of Science indexed journal)

Emad Alsuwat, (2023). “Data poisoning attacks detection based on the convergence of the Peter and Clark algorithm and Bayesian adversarial federated learning”. Journal of Electronic Imaging, 32(1), 013048. (Web of Science indexed journal)

Sarah Almalki, Hatim Alsuwat, & Emad Alsuwat, (2022). “IoT Security and Ma- chine Learning”, International Journal of Computer Science & Network Security, 22(5), 103 - 114. (Web of Science indexed journal)

Shahad Alzahrani, Taghreed Almalki, Hatim Alsuwat, & Emad Alsuwat, (2022). “Cloud of Things (CoTs): Security, Threats, and Attacks”, International Journal of Computer Science & Network Security, 21(8), 193 - 203. (Web of Science indexed journal)

Sara Almtrafi, Bdour Alkhudadi, Hatim Alsuwat, & Emad Alsuwat, (2021). “Cloud of Things (CoTs): Security, Threats, and Attacks”, International Journal of Com- puter Science & Network Security, 21(8), 229 - 237. (Web of Science indexed journal)

Ghada Aljumaie, Ghada Alzeer, Reham Alghamdi, Hatim Alsuwat, & Emad Al- suwat, (2021). “Modern Study on Internet of Medical Things (IOMT) Security”, International Journal of Computer Science & Network Security, 21(8), 254 - 266. (Web of Science indexed journal)

Asma Mohammed, Jamilah Alkhathami, Hatim Alsuwat, & Emad Alsuwat, (2021). “Security of Web Applications: Threats, Vulnerabilities, and Protection Meth- ods”, International Journal of Computer Science & Network Security, 21(8), 176 - 176. (Web of Science indexed journal)

Emad Alsuwat, Sabah Alzahrani & Hatim Alsuwat, (2021). “Detecting COVID- 19 Utilizing Probabilistic Graphical Models”, International Journal of Advanced Computer Science and Applications(IJACSA), 12(6), 786-793. (Web of Science indexed journal)

Amjaad Altalhi, Maram AL-Saedi, Hatim Alsuwat, & Emad Alsuwat, (2021). “Privacy-Preserving in the Context of Data Mining and Deep Learning”, Inter- national Journal of Computer Science & Network Security, 21(6), 137-142. (Web of Science indexed journal)

Leena Alotaibi, Azhar Alsalmi, Hatim Alsuwat, & Emad Alsuwat, (2021). “Bit- coin and the Monetary System Revolution Changes”, International Journal of Computer Science & Network Security, 21(6), 156-160. (Web of Science in- dexed journal)

Bayan Al-Amri, Hatim Alsuwat, & Emad Alsuwat, (2021). “Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey”, International Journal of Computer Science & Network Security, 21(6), 245-251. (Web of Science indexed journal)

Asalah Altwairqi, Hatim Alsuwat & Emad Alsuwat, (2020). “The Role of Dark Web on Cyberspace”, International Journal of Current Research, 12(12), 15337- 15341, DOI: 10.24941/ijcr.40274.12.2020.

Noha M. Altalhi, Emad Alsuwat, (2020). “Enhance Software Security Utilizing Code Obfuscation”, International Journal of Current Research, 12(11), 14966- 14969, DOI: 10.24941/ijcr.40257.11.2020.

Lama Alhathally and Emad Alsuwat, (2020). “Ransomware Attack Detection and Prevention”, International Journal of Current Research, 12(11), 14917-14922, DOI: 10.24941/ijcr.40253.11.2020.

Reem Alqurashi and Emad Alsuwat, (2020). “Cyber Insurance: A Case Study of United Arab of Emirates, European Union’s and Poland”. International Journal of Advances in Multidisciplinary Research. 7(12), 6478 - 6482.

May Alotaibi and Emad Alsuwat, (2020). “Tracing Distributed Denial of Ser- vice Attacks from Practical Perspectives”. International Journal of Advances in Multidisciplinary Research. 7(10), 6349-6354.

Abeer Alotaibi and Emad Alsuwat, (2020). “A Study on Social Engineering At- tacks: Phishing Attack”. International Journal of Advances in Multidisciplinary Research. 7(11), 6374-6379.

Hind Alshambari and Emad Alsuwat, (2020). “False Data Injection Attack in Healthcare”. International Journal of Advances in Multidisciplinary Research. 7(11), 6397-6400.

Samah Alhusayn and Emad Alsuwat, (2020). The Buffer Overflow Attack and How to Solve Buffer Overflow in Recent Research. Academic Journal of Research and Scientific Publishing. 2(19), 1-13.

Asma Alsufyani and Emad Alsuwat, (2020). Smart Contract Survey. Academic Journal of Research and Scientific Publishing. 2(20), 12-20.

Ohoud Al-Harthi, Emad Alsuwat, (2020). ”Comprehensive Study of Current Reverse Engineering Tools and Techniques”, International Journal of Science and Research (IJSR). 9(12), 924 - 927.

Emad Alsuwat, Hatim Alsuwat, Marco Valtorta & Csilla Farkas (2020) "Adversarial data poisoning attacks against the PC learning algorithm", International Journal of General Systems, 49:1, 3-31, DOI: 10.1080/03081079.2019.1630401

Conference Publications

Hatim Alsuwat, Emad Alsuwat, Marco Valtorta, John Rose, and Csilla Farkas. “Modeling Concept Drift in the Context of Discrete Bayesian Networks.” Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 1: KDIR, ISBN 978-989-758-382-7, pages 214 - 224. DOI: 10.5220/0008384702140224, Vienna, Austria, September 17 - 19, 2019.

Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, and Csilla Farkas. “Detecting Adversarial Attacks in the Context of Bayesian Networks.” 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’19), , pages 3 - 22. Charleston, SC, USA - July 15 - 17, 2019.

Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, and Csilla Farkas. “Data Dependencies Preserving Shuffle in Relational Database”, Second IEEE International Conference on Data Intelligence and Security (ICDIS), pages 180 - 187. South Padre Island, Texas, USA, June 28 - 30, 2019.

Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, and Csilla Farkas. “Long Duration Data Poisoning Attacks on Bayesian Networks”, Tech. report, University of South Carolina, SC, USA, 2019.

Emad Alsuwat, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. “Cyber Attacks against the PC Learning Algorithm.” Second International Workshop on A.I. and Security at ECML-18, pages 19 - 35. Dublin, September 10 - 14, 2018.

Emad Alsuwat, Marco Valtorta, and Csilla Farkas. “How to Generate the Network You Want with the PC Learning Algorithm.” Proceedings of the 11th Workshop on Uncertainty Processing (WUPES’18), pages 1 - 12. (Vaclav Kratochvıl and Jirina Vejnarova, editors.) Trebon, Czech Republic, June 6 - 9, 2018.

Emad Alsuwat, Marco Valtorta, and Csilla Farkas, “Bayesian Structure Learning Attacks”, Tech. report, University of South Carolina, SC, USA, 2018.