Personal information

Cybersecurity, Intrusion Detection, Security Education, Threat Intelligence
Germany, United Arab Emirates, United Kingdom

Activities

Employment (4)

University of Kassel: Kassel, DE

Employment
Source: Self-asserted source
Maher Salem

King's College London : London, GB

Employment
Source: Self-asserted source
Maher Salem

King's College London: London, GB

Employment
Source: check_circle
King's College London

Higher Colleges of Technology : Al Ain, AE

Employment
Source: Self-asserted source
Maher Salem

Education and qualifications (2)

Kassel University : KAssel, DE

Ph.D.
Education
Source: Self-asserted source
Maher Salem

Dusiburg -Essen University: Duisburg, DE

M.Sc.
Education
Source: Self-asserted source
Maher Salem

Professional activities (2)

King's College London: London, GB

2023-12-01 | Recognition Award (Informatics )
Distinction
Source: Self-asserted source
Maher Salem

King's College London: London, GB

2022-12-01 | Recognition Award (Informatics )
Distinction
Source: Self-asserted source
Maher Salem

Funding (1)

FHprofUnt 2013: 'Intelligente Erkennung von Cyber-Attacken auf IT-Infrastrukturen' (kurz: IntErA)

2014-03-01 to 2017-12-31 | Grant
Federal Ministry of Education and Research (Bonn, DE)
GRANT_NUMBER: 13FH023PX3
Source: Self-asserted source
Maher Salem via DimensionsWizard

Works (25)

Navigating Challenges in Online Cybersecurity Education: Insights from Postgraduate Students and Prospects for a Standardized Framework

ACM Transactions on Computing Education
2024-12-31 | Journal article
Contributors: Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Evaluating the Effectiveness of Online Cybersecurity Program in Higher Education

EDUCON 2024 - IEEE Global Engineering Education Conference, Proceedings
2024-07-08 | Conference paper | Author
SOURCE-WORK-ID:

c67bf80e-7277-4dc5-93f7-e1dddb8894b9

EID:

2-s2.0-85199109364

Part of ISBN: 9798350394023
Contributors: Maher Salem; Khalid Samara; Jeffery Pray; Mahamoud Hussein
Source: check_circle
King's College London

Enhancing Equality, Diversity, and Inclusion in Online Cybersecurity Education: A Multi-Layered Approach

2024-06-04 | Conference paper | Author
SOURCE-WORK-ID:

d6c59171-0a98-4043-9a8e-925f9d640c98

Contributors: Maher Salem
Source: check_circle
King's College London

Dynamic congestion management system for cloud service broker

International Journal of Electrical and Computer Engineering (IJECE)
2023-02-01 | Journal article
Contributors: Tariq Alwada’n; Abdel-Karim Al-Tamimi; Adel Hamdan Mohammad; Maher Salem; Yar Muhammad
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Novel Threat Intelligence Detection Model Using Neural Networks

IEEE Access
2022 | Journal article
Contributors: Maher Salem; Abdel-Karim Al-Tamimi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Mapping development and health effects of cooking with solid fuels in low-income and middle-income countries, 2000–18: a geospatial modelling study

The Lancet Global Health
2022-10-01 | Journal article
SOURCE-WORK-ID:

15078c32-a609-4b6b-907b-1933f772ca01

EID:

2-s2.0-85137821908

Contributors: JJ Frostad; QP Nguyen; MM Baumann; BF Blacker; LB Marczak; A Deshpande; KE Wiens; KE LeGrand; KB Johnson; M Abbasi-Kangevari et al.
Source: check_circle
King's College London

Feasibility and Exploratory Study of Implementing the Blockchain Technology in the UAE Financial Markets

Contemporary Research in Accounting and Finance
2022-05-29 | Conference paper | Author
SOURCE-WORK-ID:

c2c3d545-e1f9-4ea1-90fb-595df7e3cbd2

EID:

2-s2.0-85160804318

Part of ISBN: 978-981-16-8267-4
Part of ISBN: 978-981-16-8266-7
Contributors: Maher Salem; Sonia Abdennadher
Source: check_circle
King's College London

On the Use of Feature Selection for Music Genre Classification

2021-01-19 | Conference paper | Author
SOURCE-WORK-ID:

969857b2-a99f-491e-8762-ef2016e256e9

EID:

2-s2.0-85100684683

Contributors: Maher Salem; Abdel Karim Al-Tamimi
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Comparative Study of using Data Mining Techniques for Bank Telemarketing Data

2019 Sixth HCT Information Technology Trends (ITT)
2020-04-23 | Conference paper | Author
SOURCE-WORK-ID:

c7980a8d-0e87-4c79-8991-79167d1d81b7

EID:

2-s2.0-85084587966

Contributors: Maher Salem; Ali Rodan; Doha Hassan; Moayyad Mohammad
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Blockchain-Based Authentication Approach for Securing Transportation System

Intelligent Computing Systems
2020-03-11 | Conference paper | Author
SOURCE-WORK-ID:

ba824840-f888-4f85-ac74-5e4cbf1eb216

EID:

2-s2.0-85082498871

Part of ISBN: 978-3-030-43364-2
Part of ISBN: 978-3-030-43363-5
Contributors: Maher Salem
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

A privacy-preserving multi-keyword search approach in cloud computing

SOFT COMPUTING
2019-05-08 | Journal article | Author
SOURCE-WORK-ID:

87f3040e-cd49-40f6-a8a7-966a8b807835

EID:

2-s2.0-85065646705

Contributors: Maher Salem; Ahmed Manasrah; Mahmoud Abu Nasir
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Benzene Air Pollution Monitoring Model using ANN and SVM

2018 Fifth HCT Information Technology Trends (ITT)
2019-02-24 | Conference paper | Author
SOURCE-WORK-ID:

3d4929f0-2469-4775-9fe0-6a7fb00ee69b

EID:

2-s2.0-85063202452

Contributors: Maher Salem; Arwa Shawabkeh; Ali Rodan
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Feasibility Approach Based on SecMonet Framework to Protect Networks from Advanced Persistent Threat Attacks

Advances in Internet, Data and Web Technologies
2019-02-06 | Conference paper | Author
SOURCE-WORK-ID:

e2f0058b-ff28-40d1-903c-f26c2bbe809e

EID:

2-s2.0-85082319910

Contributors: Maher Salem; Moayyad Mohammad
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Security Approach for In-Vehicle Networking Using Blockchain Technology

Advances in Internet, Data and Web Technologies
2019-02-06 | Conference paper | Author
SOURCE-WORK-ID:

4865c510-2781-48c1-ba33-931524ceac20

EID:

2-s2.0-85082316665

Part of ISBN: 978-3-030-12839-5
Contributors: Maher Salem; Moayyad Mohammad; Ali Rodan
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

A novel integrated framework for securing online instructor-student communication

International Journal of Grid and Utility Computing
2019-01-05 | Journal article | Author
SOURCE-WORK-ID:

fca74fa0-7310-48ee-b167-9fb41f99ff6b

EID:

2-s2.0-85059739434

Contributors: Maher Salem; Khalid Samara
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

A secure heuristic framework for online instructor-student advising

ITT 2017 - Information Technology Trends: Exploring Current Trends in Information Technology, Conference Proceedings
2018 | Conference paper
EID:

2-s2.0-85049496347

Contributors: Salem, M.; Samara, K.; Aldhaheri, M.S.
Source: Self-asserted source
Maher Salem via Scopus - Elsevier

Transforming voluminous data flow into continuous connection vectors for IDS

International Journal of Internet Technology and Secured Transactions
2015-04-22 | Journal article | Author
SOURCE-WORK-ID:

45121872-fcb5-446f-8ba2-d5ce16117d18

EID:

2-s2.0-84928010532

Contributors: Maher Salem; Ulrich Buehler
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

A comprehensive model for revealing anomaly in network data flow

Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)
2014 | Conference paper
EID:

2-s2.0-84922574929

Part of ISSN: 16175468
Contributors: Salem, M.; Buehler, U.
Source: Self-asserted source
Maher Salem via Scopus - Elsevier

A Comprehensive Model for Revealing Anomaly in Network Data Flow

Lecture Notes in Informatics
2014 | Book chapter | Author
SOURCE-WORK-ID:

21dd583c-4530-4a2d-bfb3-e1579925a9d8

Contributors: Maher Salem; Ulrich Buehler
Source: check_circle
King's College London

Persistent dataset generation using real-time operative framework

2014 International Conference on Computing, Networking and Communications (ICNC)
2014-04-10 | Conference paper | Author
SOURCE-WORK-ID:

6f0b8772-410c-4f19-ad89-fbce0f013b3a

Contributors: Maher Salem; Sven Reißmann; Ulrich Buehler
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

An Enhanced GHSOM for IDS

2013 IEEE International Conference on Systems, Man, and Cybernetics
2014-01-27 | Conference paper | Author
SOURCE-WORK-ID:

ce3dbd39-02f4-4bfc-b278-f76b5236e22d

Contributors: Maher Salem; Ulrich Buehler
Source: check_circle
King's College London
grade
Preferred source (of 2)‎

Reinforcing network security by converting massive data flow to continuous connections for IDS

2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013
2013 | Conference paper | Author
SOURCE-WORK-ID:

90055484-7892-47d6-992a-f03f3f112b82

EID:

2-s2.0-84896671788

Part of ISBN: 9781908320209
Contributors: Maher Salem; Ulrich Buehler
Source: check_circle
King's College London
grade
Preferred source (of 3)‎

Improved Feature Selection Method using SBS-IG-Plus

ISSE 2011 Securing Electronic Business Processes
2012 | Book chapter | Author
SOURCE-WORK-ID:

9b65da54-c804-4004-a5e3-e43dd0b57be5

Contributors: Maher Salem; Ulrich Buehler; Sven Reißmann
Source: check_circle
King's College London

Mining Techniques in Network Security to Enhance Intrusion Detection Systems

International Journal of Network Security & Its Applications (IJNSA)
2012 | Journal article | Author
SOURCE-WORK-ID:

01da6966-8b2c-49bb-93a3-130171a8e2c9

Contributors: Maher Salem; Ulrich Buehler
Source: check_circle
King's College London

Measuring the Effectiveness of the Online Cybersecurity in Higher Education

IEEE EDUCON 2024
Conference paper | Writing - review & editing, Funding acquisition, Project administration, Supervision, Writing - original draft
Contributors: Maher Salem; Khalid Samara; Jeffery Pray; Mahmoud Hussein
Source: Self-asserted source
Maher Salem

Peer review (11 reviews for 1 publication/grant)

Review activity for Journal of information security and applications. (11)