default search action
Karim Ouazzane
Person information
- affiliation: London Metropolitan University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Mohamed Zaoui, Yousra Belfaik, Yassine Sadqi, Yassine Maleh, Karim Ouazzane:
A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies. IEEE Access 12: 72224-72241 (2024) - [j16]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil T. Vassilev:
A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Sci. Int. Digit. Investig. 48: 301675 (2024) - [j15]Walid El Mouhtadi, Mohamed El Bakkali, Yassine Maleh, Soufyane Mounir, Karim Ouazzane:
Refining malware detection with enhanced machine learning algorithms using hyperparameter tuning. Int. J. Crit. Comput. Based Syst. 11(1/2): 48-67 (2024) - [j14]Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem:
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response. Network 4(1): 68-90 (2024) - 2023
- [j13]Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. J. Cybersecur. Priv. 3(4): 808-829 (2023) - 2022
- [j12]Cyril Onwubiko, Karim Ouazzane:
Multidimensional Cybersecurity Framework for Strategic Foresight. Int. J. Cyber Situational Aware. 6(1): 46-77 (2022) - [j11]Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz:
Real-Time Cyber Analytics Data Collection Framework. Int. J. Inf. Secur. Priv. 16(1): 1-10 (2022) - [j10]Karim Ouazzane, Thekla Polykarpou, Yogesh Patel, Jun Li:
An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach. Int. J. Inf. Secur. Priv. 16(1): 1-17 (2022) - [j9]Cyril Onwubiko, Karim Ouazzane:
SOTER: A Playbook for Cybersecurity Incident Management. IEEE Trans. Engineering Management 69(6): 3771-3791 (2022) - 2019
- [j8]Kanana Ezekiel, Vassil T. Vassilev, Karim Ouazzane, Yogesh Patel:
Adaptive business rules framework for workflow management. Bus. Process. Manag. J. 25(5): 948-971 (2019) - [j7]Cyril Onwubiko, Karim Ouazzane:
Challenges towards Building an effective Cyber Security Operations Centre. Int. J. Cyber Situational Aware. 4(1): 11-39 (2019) - 2015
- [j6]Chi Li, Yong Xue, Quanhua Liu, Karim Ouazzane, Jiahua Zhang:
Using SeaWiFS Measurements to Evaluate Radiometric Stability of Pseudo-Invariant Calibration Sites at Top of Atmosphere. IEEE Geosci. Remote. Sens. Lett. 12(1): 125-129 (2015) - 2013
- [j5]Karim Ouazzane, Markson Aigbodi, Daniel Mitchell, Vassil T. Vassilev, Jun Li:
An Innovative Custom Cyber Security Solution for Protecting Enterprises and Corporates' Assets. Int. J. E Entrepreneurship Innov. 4(3): 53-64 (2013) - [j4]Hassan B. Kazemian, Karim Ouazzane:
Neuro-Fuzzy approach to video transmission over ZigBee. Neurocomputing 104: 127-137 (2013) - [j3]Jun Li, Karim Ouazzane, Hassan B. Kazemian, Muhammad Sajid Afzal:
Neural Network Approaches for Noisy Language Modeling. IEEE Trans. Neural Networks Learn. Syst. 24(11): 1773-1784 (2013) - 2012
- [j2]Karim Ouazzane, Jun Li, Hassan B. Kazemian, Yanguo Jing, Richard Boyd:
An Artificial Intelligence-based language modeling framework. Expert Syst. Appl. 39(5): 5960-5970 (2012) - 2011
- [j1]Jun Li, Karim Ouazzane, Hassan B. Kazemian, Yanguo Jing, Richard Boyd:
A neural network based solution for automatic typing errors correction. Neural Comput. Appl. 20(6): 889-896 (2011)
Conference and Workshop Papers
- 2022
- [c20]Viktor Sowinski-Mydlarz, Vassil T. Vassilev, Karim Ouazzane, Anthony Phipps:
Security Analytics Framework Validation Based on Threat Intelligence. CSCI 2022: 942-947 - 2020
- [c19]Anthony Phipps, Karim Ouazzane, Vassil T. Vassilev:
Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound. TrustCom 2020: 1428-1436 - 2019
- [c18]Cyril Onwubiko, Karim Ouazzane:
Cyber Onboarding is 'Broken'. Cyber Security 2019: 1-13 - [c17]Yogesh Patel, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, George L. Walker:
Keystroke Dynamics using Auto Encoders. Cyber Security 2019: 1-8 - 2018
- [c16]Mohammad Hossein Amirhosseini, Hassan B. Kazemian, Karim Ouazzane, Chris Chandler:
Natural Language Processing approach to NLP Meta model automation. IJCNN 2018: 1-8 - 2016
- [c15]Iman Samizadeh, Hassan B. Kazemian, Ken Fisher, Karim Ouazzane:
Performance optimization in video transmission over ZigBee using Particle Swarm Optimization. IWCIA 2016: 15-20 - 2013
- [c14]Iman Samizadeh, Hassan B. Kazemian, Ken Fisher, Karim Ouazzane:
Adaptive scalable rate control over IEEE 802.15.4 using particle swarm optimization. ICAT 2013: 1-5 - [c13]Mario Malcangi, Karim Ouazzane, Premit Patel:
Audio-visual fuzzy fusion for robust speech recognition. IJCNN 2013: 1-8 - 2011
- [c12]Jun Li, Karim Ouazzane, Muhammad Sajid Afzal, Hassan B. Kazemian:
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models. ICEIS (2) 2011: 5-12 - [c11]Karim Ouazzane, Muhammad Sajid Afzal, Hassan B. Kazemian, Jun Li:
An e-Business Framework Design using Enhanced Web 2.0 Technology. ICEIS (4) 2011: 97-102 - [c10]Karim Ouazzane, Jun Li, Hassan B. Kazemian:
An Intelligent Keyboard Framework for Improving Disabled People Computer Accessibility. EANN/AIAI (1) 2011: 382-391 - 2009
- [c9]Jun Li, Karim Ouazzane, Yanguo Jing, Hassan B. Kazemian, Richard Boyd:
Evolutionary Ranking on Multiple Word Correction Algorithms Using Neural Network Approach. EANN 2009: 409-418 - 2007
- [c8]Premit Patel, Karim Ouazzane:
Comparison of fixed and variable weight approaches for viseme classification. SIP 2007: 110-115 - 2003
- [c7]Redha Benhadj-Djilali, Karim Ouazzane:
Binary Image Coding Algorithm Using Tactile Data Information. CISST 2003: 645-651 - [c6]Karim Ouazzane, Kamel Zerzour, Farhi Marir, Kanana Ezekiel:
The Use of Neural Network and Database Technology to Reengineer the Technical Process of Monitoring Coal Combustion Efficiency. ICEIS (2) 2003: 495-498 - [c5]Karim Ouazzane, Kamel Zerzour:
A New System Based on the Use of Neural Networks and Database for Monitoring Coal Combustion Efficiency. IEA/AIE 2003: 537-544 - 2002
- [c4]Farhi Marir, Kamel Zerzour, Karim Ouazzane, Yong Xue:
A Conceptual Model for Surveillance Video Content and Event-Based Indexing and Retrieval. International Conference on Computational Science (1) 2002: 41-50 - [c3]Farhi Marir, Karim Ouazzane, Kamel Zerzour:
OSCONVR: An Interactive Virtual Reality Interface to an Object-Oriented Database System for Construction Architectural Design. International Conference on Computational Science (2) 2002: 258-267 - [c2]Farhi Marir, Kamel Zerzour, Karim Ouazzane:
An Integrated Object Database and Description Logic System for Online Content and Event-Based Indexing and Retrieval of a Car Park Surveillance Video. ICEIS 2002: 129-139 - [c1]Farhi Marir, Frank Wang, Karim Ouazzane:
A Case-Based Expert System for Estimating the Cost of Refurbishing Construction Buildings. ICEIS 2002: 391-398
Informal and Other Publications
- 2024
- [i6]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev:
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response. CoRR abs/2408.01999 (2024) - 2023
- [i5]Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin:
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. CoRR abs/2309.05537 (2023) - [i4]Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil T. Vassilev:
A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response. CoRR abs/2309.07064 (2023) - [i3]Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem:
A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response. CoRR abs/2312.01219 (2023) - 2022
- [i2]Cyril Onwubiko, Karim Ouazzane:
Multidimensional Cybersecurity Framework for Strategic Foresight. CoRR abs/2202.02537 (2022) - [i1]Cyril Onwubiko, Karim Ouazzane:
Challenges towards Building an effective Cyber Security Operations Centre. CoRR abs/2202.03691 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint