N
Nachaat AbdElatif Mohamed
Researcher at Universiti Sains Malaysia
Publications - 17
Citations - 1513
Nachaat AbdElatif Mohamed is an academic researcher from Universiti Sains Malaysia. The author has contributed to research in topics: Computer science & Microsoft Windows. The author has an hindex of 2, co-authored 3 publications receiving 486 citations. Previous affiliations of Nachaat AbdElatif Mohamed include University of California, Berkeley.
Papers
More filters
Journal ArticleDOI
State-of-the-art in artificial neural network applications: A survey
Oludare Isaac Abiodun,Oludare Isaac Abiodun,Aman Jantan,Abiodun Esther Omolara,Kemi Victoria Dada,Nachaat AbdElatif Mohamed,Humaira Arshad +6 more
TL;DR: The study found that neural-network models such as feedforward and feedback propagation artificial neural networks are performing better in its application to human problems and proposed feedforwardand feedback propagation ANN models for research focus based on data analysis factors like accuracy, processing speed, latency, fault tolerance, volume, scalability, convergence, and performance.
Journal ArticleDOI
SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique
TL;DR: In this paper, a new model built on Adversarial Tactics Techniques and Common Knowledge (ATT&CK) matrix for detecting Advanced Persistent Threat (APT) attack is introduced.
Journal ArticleDOI
Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication
Abiodun Esther Omolara,Aman Jantan,Oludare Isaac Abiodun,Humaira Arshad,Nachaat AbdElatif Mohamed +4 more
TL;DR: The FingerEye is a robust system integrated with iris-scan authentication that demonstrates that ATM attacks become impractical and every user has unique eyes which do not change until death and even a blind person withiris can be authenticated too.
Journal ArticleDOI
Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units
Nachaat AbdElatif Mohamed,Saif Khameis Almazrouei,Adel Oubelaid,Mahmoud Elsisi,Basem M. ElHalawany,Sherif S. M. Ghoneim +5 more
TL;DR: In this paper , the Bash Bunny (BB) tool was used to assist military, law enforcement, and penetration tester teams with their work to conduct exfiltration without privilege escalation through T 1200, T 1052, and T 10 52.001 techniques in air-gapped networks with effectiveness/success 99.706%.
Journal ArticleDOI
Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework
TL;DR: In this article , the authors have tested the Microsoft Windows Security system using MITRE CALDERA and ATT&CK frameworks and explained how APT groups are able to bypass Windows Security.