Career
Media
عربي
Sign In
About
Academics
Admission
Students
Alumni
Research
Centers
Giving
View More
Director Message
Vision, Mission and Values
Strategic Plan
Top Management
Centers
Organizational Structure
Units and Departments
OU Partnership
Accreditation
International Relations
Regulations
AOU Teaching and Learning Model
Publications
Gallery
Contact Us
Disclaimer
Projects And Initiatives
Sustainable Development
Faculty of Business Studies
Faculty of Computer Studies
Faculty of Language Studies
Faculty of Education
Graphic and Multimedia Design Technology
View More
Undergraduate
Programs
Admission Requirements
Tuition Fees
Apply
FAQ for Admission and Registration
Graduate
Programs
Admission Requirements
Tuition Fees
Apply
FAQ for Admission and Registration
Why Study at AOU
Terms and Conditions
View More
Home
Student Services
LMS
University Bulletins
Library & Learning Resources
Academic Calendar
Student Guide
Examinations
Students Affairs
Student Funds
Student Life
Student Email
FAQs
Student Complaint (FAQ)
Honor’s List
View More
View More
Research
Research & Development Committee
Published Researches
Research Centers
CALR Linguistics Journal
Conferences
Highlights
Research Bylaws
Research Forms
Awards
AOU Continuing Education Center (ACEC)
Writing Center
English speaking skills center
View More
Donors
Why Donate?
Where to Give?
How to Give?
عربي
Sign In
AOU-Lebanon Home
About
Director Message
Vision, Mission and Values
Strategic Plan
Top Management
Centers
Organizational Structure
Units and Departments
OU Partnership
Accreditation
International Relations
Regulations
AOU Teaching and Learning Model
Publications
Gallery
Contact Us
Disclaimer
Projects And Initiatives
Sustainable Development
Academics
Faculty of Business Studies
Faculty of Computer Studies
Faculty of Language Studies
Faculty of Education
Graphic and Multimedia Design Technology
Admission
Home
Why Study at AOU
Terms and Conditions
Undergraduate
Programs
Admission Requirements
Tuition Fees
Apply
FAQ for Admission and Registration
Graduate
Programs
Admission Requirements
Tuition Fees
Apply
FAQ for Admission and Registration
Students
Home
Student Services
LMS
University Bulletins
Library & Learning Resources
Academic Calendar
Student Guide
Examinations
Students Affairs
Student Funds
Student Life
Student Email
FAQs
Student Complaint (FAQ)
Honor’s List
Alumni
Research
Research
Research & Development Committee
Published Researches
Research Centers
CALR Linguistics Journal
Conferences
Highlights
Research Bylaws
Research Forms
Awards
Centers
AOU Continuing Education Center (ACEC)
Writing Center
English speaking skills center
Giving
Donors
Why Donate?
Where to Give?
How to Give?
Career
Media
Research
Research
Research & Development Committee
Published Researches
Research Centers
CALR Linguistics Journal
Conferences
Highlights
Research Bylaws
Research Forms
Awards
Toggle Sidebar
AOU Students' Theses
Page Image
Page Content
Enhanced DDoS Attack Mitigation: Leveraging Ensemble Learning In Data Cleansing
Elias Bader - 2025
Cyberbullying Automatic Detection and Mitigation on Social media using Deep Learning Techniques
Katia Berbery - 2025
Psychological Warfare Defense technique against the psychological warfare campaign conducted against Lebanon by Israel during 2024 war
Joe Ters - 2025
Explaining Advanced Malware Detection Techniques Using XAI Tools (SHAP, Eli5, and LIME
Aline Feghali - 2025
Intelligent Detection of Malicious URLs Using Feature-Based Classification and XGBoost Optimization
Mohamad Hassan - 2025
Explainable Siamese Network-Based Detection of DeepFake Impersonation Attacks using Biometrics
Hafez Haidar - 2025
Enhancing Email Security: Adaptive Detection Systems for Sophisticated Threats
Firas Abdel Nour - 2025
Towards Real-Time Threat Detection in Cloud Environments Using Automated Learning Models
Ibrahim Soubra - 2025
Demographic Feature Analysis Towards a Bias Free DeepFake Impersonation Attacks Detection
Anthony Abi Daher - 2025
AutoSecAgent: A Fully Improved Autonomous Pentester
Eddy Abdo - 2025
Detection of the Evil Twin Attack: Multi-Source Learning based on Unsupervised Techniques
Joseph El Hajj Youssef - 2025
Measuring Emails Against Phishing Tactics using Natural Language Processing (NLP)
Patrick farah - 2025
Adaptive Client Selection For MRI Reconstruction in Federated Learning
Samira Alkassar - 2025
Fake Sentiment Analysis on social media
Geryes Atallah - 2024
Securing Networks Against ICMP Covert Channels: Detection and Countermeasures
Giovanni Kaddissi - 2024
Enhancing IoT Device Security Through Digital Twins and Lightweight Cryptography: A Ditto-TinyJAMBU Approach
Mohammad Abed - 2024
Securing the Internet of Things: A Novel Hashing-Based Approach for IoT Device Connection Security
Abbass Yassine - 2024
Siamese Network-Based Detection of Deepfake Impersonation Attacks with a Person of Interest Approach
Pia Housseini - 2024
Securing Personal Data on Smartphones: Addressing APT Challenges and Phishing Threats
Ali Hodroj - 2024
Quantum-Inspired Federated Learning Inference Attacks Prevention
Elie Sokhen - 2024
GAN for MRI Reconstruction in Federated Learning
Hanan Morsel - 2024
Intelligent Network Intrusion Detection System ”INIDS”: A 2D-CNN Based IDS
Mohammad Zeid - 2024
Cloud Security: Identity and Endpoint protection (Application on Microsoft Azure)
Rayan Akl - 2024
Towards Secure Federated Learning: Enhancing Privacy and Robustness in Decentralized AI Systems
Rony Louis - 2024
Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation Using Deep Learning
Amine Tannoury - 2024
Performance Comparison of Supervised Machine Learning Techniques in Detecting Malicious Artificial Congestion in Connected Cars Environment
Mohammad Awali - 2024
Exploring The Role of Chatbots in ISO 27001 Information Security
Mahdi Sahily - 2024
CyberBOt: Raising Cyber Security Awareness Via Chatbots
Sadek Yassine - 2024
Dataset Generation and Machine learning based model for GNSS spoofing attacks
Sarah Jalloul - 2024
Enhancing Video Analytics: A Chatbot Framework for Real-Time Facial Detection and Tracking
Ali Hteit - 2024
Enhancing Data Privacy and Security in Federated Learning through Blockchain Technology
Ali Jammoul - 2024
Enhancing Intrusion Detection with Deep Learning
Abbas Darwish - 2024
Behavioral Two Factor Authentication For IAM Systems
Kamal Mouh - 2024
Detecting Malicious Websites Using Machine Learning
Hady Haddad - 2023
Optimization of DeepFake Video Detection Using Image Preprocessing
Ali Berjawi - 2023
Revisiting Attack Trees for Modeling Machine Pwning in Training Environments
Hussein Harb - 2023
PHISHING ATTACK DETECTION BASED on MACHINE LEARNING ALGOTRITHMS
Khalil Hamzi - 2023
Detecting Malicious URLs Phishing Attacks Using An Optimized Machine Learning Method
Francois Ziade - 2023
Using Blockchain and Vazka Authentication for the Security of Smart Home Devices
Wael Rayes - 2023
Intra-Slice Aggregated Defender - ISAD: Federated Learning Based Framework to Enhance 5G Intra-Slicing Security
Nidal Baz - 2023
Controller Area Network Intrusion Detection
Mohamad Ismail - 2023
Internet of Things in Smart Homes, Security Risk Assessment and Recommendations
Bahaa Bou Smail - 2023
Protection of Cognitive Security Using Explainable Fake News Detection
Sarkis Sarkissian - 2023
Detecting Advanced Persistent Threats on a Network Using Machine Learning
Georges Francis - 2023
Enhancing End-to-End Communication Security in Apache Kafka Using the SSS Algorithm
Ibrahim Kanj - 2023
Traffic Detection System Using Social Media
Alaa Kassem - 2022
TPA in Cloud Security
Nadine Beiz - 2022
Crime Detection and Profile Matching
Fatema El Husseini - 2022
Real-time Bitcoin price tendency awareness
Housam Moustafa - 2022
IEWS: a Free Open Source Intelligent Early Warning System Based on Machine Learning
Abdulrahman El Tawil - 2022
Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review
Zein Fneish - 2022
DOS/DDOS attacks detection using machine learning algorithms
Georges Hachache - 2022
Robust LSB Image Steganography System for Safe Digital Communication
Raman Abdelkhalek - 2021
EMV Protocol Security: Standard, Threats Analysis and Countermeasures
Noor El Nammar - 2021
Machine Learning for Automated and Efficient Penetration Tests
Joe El Housseini - 2021
Efficient and Robust Stego-Malware Detection & Prevention Approaches
Ali Moussawi - 2021
Integrating SIEM with SOAR for Reduced Incident Response Time
Ibrahim Azzam - 2021
Efficient and Robust Detection Framework for IoT Botnets
Nahi Aljawad - 2021
Hashgraph Security : Analysis and Evaluation
Ahmed Asadallah - 2021
Efficient Machine Learning Detection Approach for DDoS Attacks
Alaa Hallani - 2021
IoT DDoS Traffic detection using Machine Learning and heuristics
Rani Al Rahbani - 2021
Social Engineering Awareness Assessment
Abdul Ayyad - 2021
Cloud Security: Data Protection Techniques for CSP and CC
Ali Sakr - 2020
Enhanced K-Nearest Neighbor algorithm for network traffic classification based on sigmoid
Ali Khiereddine - 2020
Efficient and Robust feature selection technique for detecting DDoS & Port Scan Traffic
Abed Naboulsi - 2020
The Pivotal Role of Artificial Intelligence Tools in Big Data Forensics
Elie Keyrouz - 2020
Towards Efficient and Secure Privacy-Preserving Solutions Using Homomorphic Encryption
Maroun Kreidy - 2020
Survey on Mobile Security and Malware Detection Tools
Ramy Nouwar - 2020
Minimize False Positive And False Negative In Online Transaction
Etienne Hajj - 2020
Ransomware Detection over Network
Hassan Jradi - 2020
Fileless Malware Evolution and Evasion
Imad Menam - 2020
Efficient and Secure Statistical DDoS & Port Scan Detection Scheme
Hussein Majed - 2020
Efficient MIRIA Botnet Detection Scheme
Hasan Idriss - 2020
Design and Realization of Efficient and Secured Privacy Preserving Algorithm for Public Data
Elie Helou - 2020
Exploiting Vulnerabilities of MRI Scanner Machine: Lebanon Case Study
Reem Nabha - 2020
Survey on Fake Accounts Detection Algorithms on Online Social Networks
Jad Shamseddine - 2020
Exploiting vulnerabilities of IP cameras in Lebanon.
Peter Bathich - 2020
A Quantitative Study of Social Engineering in Cyber Security
Eliot Noun - 2020
Digital Forensics Survey of Android Based Handheld Devices
Marie Boueiz - 2020
Security enhancement in storage area network
Souheil Chukry - 2019
Towards Securing LoRaWAN ABP Communication System
Tarif Hatoum - 2019
A Simple Approach for Securing IoT Data Transmitted over Multi-RATs
Rida Diba - 2019
EFFICIENT COUNTERMEASURES AGAINST ANTI-FORENSICS TECHNIQUES
Ahmad Hammoud - 2019
5G Security: Limitations, Issues, and Recommendations
Elie Lahoud - 2019
Cyber-physical systems security: Limitations, issues and future trends
Jean Abs- Yaacoub - 2019
Destroying Image Stegomalware Using a Lightweight and Robust Noising & an Invisible Watermark Approach
Andrew El Housseini - 2019
A Lightweight IoT Security Solution
Hisham Yassine - 2018
Business process models syntactic quality defects formalization using OCL
Nadine Kamal Eddine - 2017
A New Model for Rating Users’ Profiles in Online Social Networks
Nadine Alsaid - 2016
Heart Rate Test reports Combined With Detailed User Contextual Information Using (Handheld Devices) Smartphone (HRMCPC)
Zaher Hamza - 2016
ENHANCING CLOUD DATABASE SCALABILITY THROUGH MOBILE AGENT
Hiba Khaddaj - 2015
KEY EXCHANGE MECHANISM TO ENSURE PRIVACY IN SMART GRIDS
Rami Sleiman - 2015
A COMPARATIVE APPROACH TO MODEL TRAFFIC LIGHT CONTROLLER BASED ON ARTIFICIAL NEURAL NETWORKS
Jinan Aboutaam - 2015
Mobile user signature extraction based on user behavioural pattern (MUSEP)
Beatrice El-Hage - 2015
Copyright 2022 © Arab Open University - Lebanon. All Rights Reserved.
🍪 This website uses cookies to improve performance and get the best experience on our website.
Learn more
I Got It