The COVID-19 pandemic has attracted the attention of big data analysts and artificial intelligenc... more The COVID-19 pandemic has attracted the attention of big data analysts and artificial intelligence engineers. The classification of computed tomography (CT) chest images into normal or infected requires intensive data collection and an innovative architecture of AI modules. In this article, we propose a platform that covers several levels of analysis and classification of normal and abnormal aspects of COVID-19 by examining CT chest scan images. Specifically, the platform first augments the dataset to be used in the training phase based on a reliable collection of images, segmenting/detecting the suspicious regions in the images, and analyzing these regions in order to output the right classification. Furthermore, we combine AI algorithms, after choosing the best fit module for our study. Finally, we show the effectiveness of this architecture when compared to other techniques in the literature. The obtained results show that the accuracy of the proposed architecture is 95%.
Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traf... more Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore. In this work, we present an optimal countermeasure to prevent an adversary from inferring users’ online activities, using traffic analysis. First, we formulate analytically a constrained optimization problem to maximize network traffic obfuscation while minimizing overhead costs. Then, we provide OPriv, a practical and efficient algorithm to solve dynamically the non-linear programming (NLP) problem, using Cplex optimization. Our heuristic algorithm selects target applications to mutate to and the corresponding packet length, and subsequently decreases the security risks of statistical traffic analysis attacks. Furthermore, we develop an analytical model to measure the obfuscation system’s resilience to traffic analysis attacks. We suggest information theoretic metrics for quantitative privacy measurement, using entropy. The full pri...
Web Services are widely used to provide services and exchange data among business units, customer... more Web Services are widely used to provide services and exchange data among business units, customers, partners and suppliers for enterprises. Although Web Services signiflcantly improve the interaction and development of processes in the business world, they raise several security concerns, since they greatly increase the exposure of critical enterprise data. Web Services exchange data using SOAP messages that are based on the interoperable XML language. We have previously introduced XPRIDE as an enhanced security architecture for assuring confldentiality and integrity of SOAP messages. XPRIDE uses contentbased encryption to secure SOAP messages based on their XML content, and depends on security policies to deflne the parts of the SOAP message that need to be encrypted. Security policies are deflned by administrators for each Web Service that needs to be secured. This paper extends XPRIDE using a modular design approach to ensure extensibility, such that new modules can be developed ...
In this work, a novel target detector for hyperspectral imagery is developed. The detector is ind... more In this work, a novel target detector for hyperspectral imagery is developed. The detector is independent on the unknown covariance matrix, behaves well in large dimensions, distributional free, invariant to atmospheric effects, and does not require a background dictionary to be constructed. Based on a modification of the robust principal component analysis (RPCA), a given hyperspectral image (HSI) is regarded as being made up of the sum of a low-rank background HSI and a sparse target HSI that contains the targets based on a pre-learned target dictionary specified by the user. The sparse component is directly used for the detection, that is, the targets are simply detected at the non-zero entries of the sparse target HSI. Hence, a novel target detector is developed, which is simply a sparse HSI generated automatically from the original HSI, but containing only the targets with the background is suppressed. The detector is evaluated on real experiments, and the results of which demo...
This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the ... more This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable security model and specifies a flexible, multi-level, and fine-grained encryption methodology that provides the suitable security strength without compromising performance. PATRIOT is designed in a platform-neutral manner and it can be deployed on a wide range of wireless devices and operating systems.
The COVID-19 pandemic has attracted the attention of big data analysts and artificial intelligenc... more The COVID-19 pandemic has attracted the attention of big data analysts and artificial intelligence engineers. The classification of computed tomography (CT) chest images into normal or infected requires intensive data collection and an innovative architecture of AI modules. In this article, we propose a platform that covers several levels of analysis and classification of normal and abnormal aspects of COVID-19 by examining CT chest scan images. Specifically, the platform first augments the dataset to be used in the training phase based on a reliable collection of images, segmenting/detecting the suspicious regions in the images, and analyzing these regions in order to output the right classification. Furthermore, we combine AI algorithms, after choosing the best fit module for our study. Finally, we show the effectiveness of this architecture when compared to other techniques in the literature. The obtained results show that the accuracy of the proposed architecture is 95%.
Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traf... more Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore. In this work, we present an optimal countermeasure to prevent an adversary from inferring users’ online activities, using traffic analysis. First, we formulate analytically a constrained optimization problem to maximize network traffic obfuscation while minimizing overhead costs. Then, we provide OPriv, a practical and efficient algorithm to solve dynamically the non-linear programming (NLP) problem, using Cplex optimization. Our heuristic algorithm selects target applications to mutate to and the corresponding packet length, and subsequently decreases the security risks of statistical traffic analysis attacks. Furthermore, we develop an analytical model to measure the obfuscation system’s resilience to traffic analysis attacks. We suggest information theoretic metrics for quantitative privacy measurement, using entropy. The full pri...
Web Services are widely used to provide services and exchange data among business units, customer... more Web Services are widely used to provide services and exchange data among business units, customers, partners and suppliers for enterprises. Although Web Services signiflcantly improve the interaction and development of processes in the business world, they raise several security concerns, since they greatly increase the exposure of critical enterprise data. Web Services exchange data using SOAP messages that are based on the interoperable XML language. We have previously introduced XPRIDE as an enhanced security architecture for assuring confldentiality and integrity of SOAP messages. XPRIDE uses contentbased encryption to secure SOAP messages based on their XML content, and depends on security policies to deflne the parts of the SOAP message that need to be encrypted. Security policies are deflned by administrators for each Web Service that needs to be secured. This paper extends XPRIDE using a modular design approach to ensure extensibility, such that new modules can be developed ...
In this work, a novel target detector for hyperspectral imagery is developed. The detector is ind... more In this work, a novel target detector for hyperspectral imagery is developed. The detector is independent on the unknown covariance matrix, behaves well in large dimensions, distributional free, invariant to atmospheric effects, and does not require a background dictionary to be constructed. Based on a modification of the robust principal component analysis (RPCA), a given hyperspectral image (HSI) is regarded as being made up of the sum of a low-rank background HSI and a sparse target HSI that contains the targets based on a pre-learned target dictionary specified by the user. The sparse component is directly used for the detection, that is, the targets are simply detected at the non-zero entries of the sparse target HSI. Hence, a novel target detector is developed, which is simply a sparse HSI generated automatically from the original HSI, but containing only the targets with the background is suppressed. The detector is evaluated on real experiments, and the results of which demo...
This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the ... more This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable security model and specifies a flexible, multi-level, and fine-grained encryption methodology that provides the suitable security strength without compromising performance. PATRIOT is designed in a platform-neutral manner and it can be deployed on a wide range of wireless devices and operating systems.
Uploads
Papers by Ali Chehab