Papers by Manar Abu Talib

2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020
Repositories are important indicators for liveness and maturity in software development communiti... more Repositories are important indicators for liveness and maturity in software development communities. They host user-facing applications or re-usable artefacts to build such applications. While rarely decentralised themselves, they are important for hosting code for decentralised applications. In this study, we investigate public repositories dedicated to decentralised applications, or-DApps, executing on heterogeneous blockchain platforms. The study is the first to report aggregated metrics on the repository-level and application-level characteristics including-DApps metadata, associated smart contracts composition and inconsistencies between repositories in both schema and content. The main contributions are data acquisition tools and an evolving public dataset along with an initial analysis to derive key metrics in a reproducible way. Insights provided encompass the dominance of Ethereum, the absence of smart contracts for a significant portion of applications, and unused application advertisement potential by absence from popular repositories. The insights can be exploited by developers to build high-quality and highly popular applications and set up corresponding quality checks.

IEEE Access, 2021
The popularity and usage of Cloud computing is increasing rapidly. Several companies are investin... more The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service for others. One of the results of Cloud development is the emergence of various security problems for both industry and consumer. One of the ways to secure Cloud is by using Machine Learning (ML). ML techniques have been used in various ways to prevent or detect attacks and security gaps on the Cloud. In this paper, we provide a Systematic Literature Review (SLR) of ML and Cloud security methodologies and techniques. We analyzed 63 relevant studies and the results of the SLR are categorized into three main research areas: (i) the different types of Cloud security threats, (ii) ML techniques used, and (iii) the performance outcomes. We have defined 11 Cloud security areas. Moreover, distributed denial-of-service (DDoS) and data privacy are the most common Cloud security areas, with a 16% level of use and 14%respectively. On the other hand, we found 30 ML techniques used, some used hybrid and others as standalone. The most popular ML used is SVM in both hybrid and standalone models. Furthermore, 60% of the papers compared their models with other models to prove the efficiency of their proposed model. Moreover, 13 different evaluation metrics were enumerated. The most applied metric is true positive rate and least used is training time. Lastly, from 20 datasets found, KDD and KDD CUP'99 are the most used among relevant studies.
Implementation of Hyperledger-Based Secure Firmware Update Delivery for IoT Devices
Trust Models for Next-Generation Blockchain Ecosystems, 2021
Firmware Update Attacks and Security for IoT Devices
Proceedings of the ArabWIC 6th Annual International Conference Research Track on - ArabWIC 2019

Improved Optical Flow Estimation Method for Deepfake Videos
Creating deepfake multimedia, and especially deepfake videos, has become much easier these days d... more Creating deepfake multimedia, and especially deepfake videos, has become much easier these days due to the availability of deepfake tools and the virtually unlimited numbers of face images found online. Research and industry communities have dedicated time and resources to develop detection methods to expose these fake videos. Although these detection methods have been developed over the past few years, synthesis methods have also made progress, allowing for the production of deepfake videos that are harder and harder to differentiate from real videos. This research paper proposes an improved optical flow estimation-based method to detect and expose the discrepancies between video frames. Augmentation and modification are used to improve the system’s overall accuracy. Furthermore, the system is trained on Graphics Processing Units (GPUs) and Tensor Processing Units (TPUs) to explore the effects and benefit of each type of hardware in deepfake detection. TPUs were found to have short...
Blockchain for government services — Use cases, security benefits and challenges
2018 15th Learning and Technology Conference (L&T)
A systematic literature review on hardware implementation of artificial intelligence algorithms
The Journal of Supercomputing
Inter Blockchain Communication
Proceedings of the ArabWIC 6th Annual International Conference Research Track on - ArabWIC 2019
Developing House of Information Quality framework for IoT systems
International Journal of System Assurance Engineering and Management
Artificial intelligence applications in solid waste management: A systematic research review
Waste Management

International Journal of Distributed Sensor Networks
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing... more Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant threat both to industry and to consumers. As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. This research article focuses on examining the systematic literature on Internet-of-Vehicles and security. It also provides comprehensive and unbiased information regarding various state-of-the-art security problems, solutions, and proposals in vehicular ad hoc networks and Internet-of-Vehicles. Systematic literature review is used for more than 127 different research articles published between the years 2010 and 2018. The results of the systematic literature review used are categorized into the following three main categories: (1) the different types of attacks on Internet-of-Vehicles, (2) the different solutions that can be implemented to solve the threats, and (3) the performance outcomes.
Novel blockchain reference model for government services: Dubai government case study
International Journal of System Assurance Engineering and Management

Issues in Informing Science and Information Technology
The College of Information Technology (CIT) at Zayed University seeks to produce graduates recogn... more The College of Information Technology (CIT) at Zayed University seeks to produce graduates recognized by business, government, and educational entities in the United Arab Emirates, the Gulf region, and the rest of the world as having a sound, current, and comprehensive education in IT. However, the enrollment of the CIT is limited, compared to other colleges. Two surveys have revealed the importance of introducing the CIT to young male and female students before they decide on their major field of study. In this paper, we present the marketing strategy followed by our CIT, based on presentations to students in the COL 105 (Career Exploration) and COL 270 (Introduction to IT) courses, which prepare them well for "Majors Day" and other high profile IT events they can attend. This marketing strategy is designed to increase the students' knowledge about the CIT, especially those who have no background in computing. Our proposed strategy is inspiring them to spend more time learning about the CIT, and a population growth study has shown promising results and an increase in enrollment since the fall of 2010. In addition, we include a set of suggestions and recommendations on how to enhance this strategy.

Issues in Informing Science and Information Technology
ISO/IEC 27001 is the most used standard within the information security field. It is used by orga... more ISO/IEC 27001 is the most used standard within the information security field. It is used by organizations that manage information on behalf of others and it is applied to assure the protection of critical client information. In general, applying ISO standards could be costly and require expert people. This paper introduces a survey study about using the standards in the UAE and details three case studies on ISO 27001 implementation: One case study follows the ISO 27001 framework, and it is expanded by using additional management processes. The second case study integrates both ISO 27001 and ISO 20000 standards. The final case study details the certification process for ISO 27001 only. This research paper shows that the use of ISO 27001 in this region of the world is quite promising and puts the guidelines for any organization interested to apply this standard..
Interdisciplinary Journal of Information, Knowledge, and Management
Lack of a suitable set of controls during the development life cycle of software will lead to mis... more Lack of a suitable set of controls during the development life cycle of software will lead to mistakes in the requirements, design, or code of software and, therefore, result in significant security vulnerabilities. This paper proposes a software engineering course from the security perspective, which can be taught at both the undergraduate and graduate levels. It will prepare students to successfully cope with the technical challenges as well as the non technical issues associated with the software development process, while integrating security into each phase of the process. The course materials are derived from the Guide to the Software Engineering Body of Knowledge (SWEBOK) published by the IEEE Computer Society with the support of a consortium of industrial sponsors.

Journal of Cases on Information Technology
Open source software (OSS) has recently become very important due to the rapid expansion of the s... more Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introduced to evaluate software quality in various fields. The banking sector is one of the most critical sectors, as it deals with highly sensitive data; it therefore requires an accurate and effective assessment of software quality. In this article, two pieces of banking software are compared: one open source and one closed source. A new quality in use model, inspired by ISO/IEC 25010, is used to ensure concise results in the comparison. The results obtained show the great potential of OSS, especially in the banking field.
Design and Implementation of Automated IoT Security Testbed
Computers & Security

International Journal of Distributed Sensor Networks
This article addresses the problem related to the reliability of path after transmitting the give... more This article addresses the problem related to the reliability of path after transmitting the given amount of data with the service-level agreement cooperation in the computer communication network. The links have associated with service performance factor parameter during the data transmission, and each node is associated with the requested service performance factor. In this article, first we have considered the single objective to minimize the transmission time of the quickest path problem. An algorithm for quickest path problem has been proposed for results, and furthermore, its time complexity has been shown. The problem has been extended with bi-objective optimization of the quickest path problem, which minimizes the transmission time and hybrid logarithmic reliability. An algorithm is proposed for getting the number of efficient solutions for the quickest path problem using label-correcting algorithm. The algorithms are implemented and tested on different standard benchmark ne...
Toward an Efficient Deployment of Open Source Software in the Internet of Vehicles Field
Arabian Journal for Science and Engineering
Enhancing computing studies in high schools: A systematic literature review & UAE case study
Heliyon
Uploads
Papers by Manar Abu Talib