Publications by authors named "Mohammed Aljebreen"

Internet of Vehicles (IoV) is a multi-node network which switches data in an open and wireless environment. Numerous interaction activities occur among IoV entities to share significant information, which is essential for network operation. As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security.

View Article and Find Full Text PDF

Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. These threats are chiefly related to serverless structures owing to their features, such as auto-scaling, pay-as-you-go method, cost amplification, and limited control. Serverless computing, Function-as-a-Service (FaaS), is a cloud computing (CC) system that permits developers to construct and run applications without a conventional server substructure.

View Article and Find Full Text PDF

The rapid growth of the Internet of Things (IoT) and its extensive use in many regions, such as smart homes, healthcare, and vehicles, have made IoT security increasingly critical. Ransomware is an advanced and adjustable threat influencing users globally, limiting admittance to their data or systems over models like file encryption or screen locking. Traditional ransomware detection methods frequently drop, deprived of the ability to combat these threats successfully.

View Article and Find Full Text PDF

Cyberattacks have given rise to several phenomena and have raised concerns among users and power system operators. When they are built to bypass state estimation bad data recognition methods executed in the conventional grid system control room, False Data Injection Attacks (FDIA) pose a significant security threat to the operation of power systems. Therefore, real-time monitoring becomes inevitable with the quick implementation of renewables within the grid operator.

View Article and Find Full Text PDF

Cloud computing (CC) is an internet-enabled environment that provides computing services such as networking, databases, and servers to clients and organizations in a cost-effective manner. Despite the benefits rendered by CC, its security remains a prominent concern to overcome. An intrusion detection system (IDS) is generally used to detect both normal and anomalous behavior in networks.

View Article and Find Full Text PDF

An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT.

View Article and Find Full Text PDF

Businesses need to use sentiment analysis, powered by artificial intelligence and machine learning to forecast accurately whether or not consumers are satisfied with their offerings. This paper uses a deep learning model to analyze thousands of reviews of Amazon Alexa to predict customer sentiment. The proposed model can be directly applied to any company with an online presence to detect customer sentiment from their reviews automatically.

View Article and Find Full Text PDF