scispace - formally typeset
A

Abdelshakour Abuzneid

Researcher at University of Bridgeport

Publications -  57
Citations -  855

Abdelshakour Abuzneid is an academic researcher from University of Bridgeport. The author has contributed to research in topics: Wireless sensor network & Intrusion detection system. The author has an hindex of 13, co-authored 57 publications receiving 477 citations.

Papers
More filters
Journal ArticleDOI

Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection

TL;DR: A Multi-Class Combined performance metric is proposed to compare various multi-class and binary classification systems through incorporating FAR, DR, Accuracy, and class distribution parameters and a uniform distribution based balancing approach is developed to handle the imbalanced distribution of the minority class instances in the CICIDS2017 network intrusion dataset.
Journal ArticleDOI

Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic

TL;DR: The proposed system was able to detect attacks with up to 99.99% accuracy when handling the imbalanced class distribution with fewer samples, making it more convenient in real-time data fusion problems that target data classification.
Journal ArticleDOI

Stages-Based ECG Signal Analysis From Traditional Signal Processing to Machine Learning Approaches: A Survey

TL;DR: A stages-based model for ECG signal analysis is introduced where a survey of ECG analysis related work is presented in the form of this stage-based process model and both traditional time/frequency-domain and advanced machine learning techniques reported in the published literature are presented.
Journal ArticleDOI

Smartphone-Based Self-Testing of COVID-19 Using Breathing Sounds.

TL;DR: The ideas presented have the potential to be deployed as self-test breathing monitoring apps for the ongoing global COVID-19 pandemic, where users can check their breathing sound pattern frequently through the app.
Journal ArticleDOI

Survey on Prominent RFID Authentication Protocols for Passive Tags.

TL;DR: Some of the recent RFID protocols in term of security requirements, computation, and attack resistance are examined and it is concluded that only five protocols resist all of the major attacks, while only one protocol satisfies all the security requirements of the RFID system.