[HTML][HTML] Reinforcement learning for an efficient and effective malware investigation during cyber Incident response

D Dunsin, MC Ghanem, K Ouazzane… - High-Confidence …, 2025 - Elsevier
The ever-escalating prevalence of malware is a serious cybersecurity threat, often requiring
advanced post-incident forensic investigation techniques. This paper proposes a framework …

AI-Powered Anomaly Detection for Kubernetes Security: A Systematic Approach to Identifying Threats

AK Bhardwaj, PK Dutta… - Babylonian Journal of …, 2024 - mesopotamian.press
This study delves into the intricacies of AI-based threat detection in Kubernetes security, with
a specific focus on its role in identifying anomalous behavior. By harnessing the power of AI …

SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory

AT Syed, MC Ghanem, E Benkhelifa, FI Abro - arXiv preprint arXiv …, 2025 - arxiv.org
The increasing sophistication of modern cyber threats, particularly file-less malware relying
on living-off-the-land techniques, poses significant challenges to traditional detection …

[PDF][PDF] Leveraging Reinforcement Learning for an Efficient Automation of Windows Registry Analysis During Cyber Incident

MC Ghanem, E Benkhelifa, D Wojtczak, MA Ferrag… - 2025 - preprints.org
Windows represents the most common platform found in seized computers due to its
widespread presence. This disparity has become worse due to the introduction of Microsoft's …

[PDF][PDF] Synchronization, optimization, and adaptation of machine learning techniques for computer vision in Cyber-Physical Systems: a comprehensive analysis

KH Tank, MC Ghanem, V Vassilev… - Preprints …, 2025 - repository.londonmet.ac.uk
Cyber-Physical Systems (CPS) seamlessly integrate computers, networks, and physical
devices, enabling machines to communicate, process data, and respond to real-world …

[PDF][PDF] Advancing Cyber Incident Timeline Analysis Through Retrieval-Augmented Generation and Large Language Models

FY Loumachi, MC Ghanem, MA Ferrag - 2024 - preprints.org
Cyber timeline analysis or Forensic timeline analysis is critical in Digital Forensics and 1
Incident Response (DFIR) investigations. It involves examining artefacts and events …

[PDF][PDF] Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine

MC Ghanem, EA Palmieri, W Sowinski-Mydlarz… - 2025 - researchgate.net
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital
forensic investigators due to their diverse architectures, communication protocols, and …

Optimal portfolio and trading strategy using machine learning

K Ouazzane, KHPY Tang, MC Ghanem - 2024 - repository.londonmet.ac.uk
This research presents machine learning models for forecasting the future returns of a
portfolio from NASDAQ semiconductors assets by financial analysis, optimization, and …

Harnessing Artificial Intelligence and Machine Learning to Transform Cloud Computing with Enhanced Efficiency and Personalization

V Sankaradass, R Devasenan - 2024 - researchsquare.com
This work seeks to evaluate how ML and GAI could be integrated into the cloud computing
model with an effort of optimizing the use of resources, minimizing energy consumption and …

Spectre: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory

MC Ghanem, AT Syed, E Benkhelifa… - … and Investigation in … - papers.ssrn.com
The increasing sophistication of modern cyber threats, particularly file-less malware relying
on" living off the land" techniques, poses significant challenges to traditional detection …