This study delves into the intricacies of AI-based threat detection in Kubernetes security, with a specific focus on its role in identifying anomalous behavior. By harnessing the power of AI …
AT Syed, MC Ghanem, E Benkhelifa, FI Abro - arXiv preprint arXiv …, 2025 - arxiv.org
The increasing sophistication of modern cyber threats, particularly file-less malware relying on living-off-the-land techniques, poses significant challenges to traditional detection …
Windows represents the most common platform found in seized computers due to its widespread presence. This disparity has become worse due to the introduction of Microsoft's …
KH Tank, MC Ghanem, V Vassilev… - Preprints …, 2025 - repository.londonmet.ac.uk
Cyber-Physical Systems (CPS) seamlessly integrate computers, networks, and physical devices, enabling machines to communicate, process data, and respond to real-world …
Cyber timeline analysis or Forensic timeline analysis is critical in Digital Forensics and 1 Incident Response (DFIR) investigations. It involves examining artefacts and events …
MC Ghanem, EA Palmieri, W Sowinski-Mydlarz… - 2025 - researchgate.net
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and …
K Ouazzane, KHPY Tang, MC Ghanem - 2024 - repository.londonmet.ac.uk
This research presents machine learning models for forecasting the future returns of a portfolio from NASDAQ semiconductors assets by financial analysis, optimization, and …
V Sankaradass, R Devasenan - 2024 - researchsquare.com
This work seeks to evaluate how ML and GAI could be integrated into the cloud computing model with an effort of optimizing the use of resources, minimizing energy consumption and …
The increasing sophistication of modern cyber threats, particularly file-less malware relying on" living off the land" techniques, poses significant challenges to traditional detection …