Artificial intelligence (AI) and machine learning (ML)-based Information security in electric vehicles: A review

N Mohamed, SK Almazrouei, A Oubelaid… - 2023 5th Global …, 2023 - ieeexplore.ieee.org
The use of artificial intelligence (AI) and machine learning (ML) in electric vehicles (EVs) is
gaining popularity as a means of improving information security. However, there is a lack of …

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

[PDF][PDF] Staying ahead of threats: a review of ai and cyber security in power generation and distribution

N Mohamed, A Oubelaid… - International Journal of …, 2023 - researchgate.net
░ ABSTRACT-The integration of artificial intelligence (AI) and the Internet of Things (IoT) in
the power generation and distribution industry presents opportunities and challenges …

Understanding the threat posed by Chinese cyber warfare units

N Mohamed, SK Almazrouei, A Oubelaid… - 2023 IEEE 3rd …, 2023 - ieeexplore.ieee.org
The emergence of China as a global superpower has presented numerous challenges,
among which is the growing threat posed by Chinese cyber warfare units. Operating under …

A review of AI approaches in combating advanced persistent threats (APTs) in cybersecurity

N Mohamed - 2024 15th International Conference on …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of cybersecurity, Advanced Persistent Threats (APTs)
present a formidable challenge to organizations worldwide. These sophisticated, long-term …

AI in Combatting Man-in-the-Middle Attacks: A Comprehensive Review

N Mohamed, AA Ahmed - 2024 15th International Conference …, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, Man-in-the-Middle (MitM) attacks represent a
significant and persistent threat, capable of intercepting and manipulating digital …

Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits.

N Mohamed, H Taherdoost… - EAI Endorsed …, 2025 - search.ebscohost.com
This paper provides an in-depth examination of the latest machine learning (ML)
methodologies applied to the detection and mitigation of zero-day exploits, which represent …

Renewable Energy in the Age of AI: Cybersecurity Challenges and Opportunities

N Mohamed - 2024 15th International Conference on …, 2024 - ieeexplore.ieee.org
In the quest for sustainable energy solutions, the integration of Artificial Intelligence (AI) and
cybersecurity within renewable energy systems, particularly microgrids, is increasingly …

A Comprehensive Review of Natural Language Processing Techniques for Malware Detection

N Mohamed - 2024 15th International Conference on …, 2024 - ieeexplore.ieee.org
In an era marked by the unprecedented proliferation of cybersecurity threats, conventional
malware detection paradigms characterized by signature-based and heuristic …

Eye-gesture control of computer systems via artificial intelligence

N Mohamed - F1000Research, 2024 - f1000research.com
Background Artificial Intelligence (AI) has the potential to significantly enhance human-
computer interactions. This paper introduces a cutting-edge method for computer control …