Marwan Omar

Marwan Omar serves an Assistant Professor of Computer Science at the department of computer science and CIS. Prior to joining Academia, Omar worked for Hewlett-Packard as a database developer where he helped build, design, and implement MS SQL database for their software and hardware products in the server industry. Omar is recognized for his information security expertise and knowledge and holds a security + certification from Comptia. Research interests are: cyber security, mobile security, open source software, and cloud computing.

Publications

Can a Student Large Language Model Perform as Well as Its Teacher?
Sia Gholami, Marwan Omar. © 2024. 18 pages.
The burgeoning complexity of contemporary deep learning models, while achieving unparalleled accuracy, has inadvertently introduced deployment challenges in resource-constrained...
Adapting to Change: Assessing the Longevity and Resilience of Adversarially Trained NLP Models in Dynamic Spam Detection Environments
Mahmoud Basharat, Marwan Omar. © 2024. 17 pages.
The rapid evolution of cyber threats in digital communication necessitates robust and adaptive natural language processing (NLP) models, especially for spam detection. This...
From Attack to Defense: Strengthening DNN Text Classification Against Adversarial Examples
Marwan Omar. © 2024. 22 pages.
In recent academic discussions surrounding the textual domain, there has been significant attention directed towards adversarial examples. Despite this focus, the area of...
Revolutionizing Malware Detection: A Paradigm Shift Through Optimized Convolutional Neural Networks
Marwan Omar. © 2024. 25 pages.
Cybercrime has grown into a multi-billion dollar industry in recent years. Malware deployment is one of these cybercrimes' most common aspects. This malicious software has...
Advancing IoT Security Posture K-Means Clustering for Malware Detection
Ali Dayoub, Marwan Omar. © 2024. 19 pages.
The ever-expanding internet of things (IoT) ecosystem has brought with it new challenges in terms of security and malware detection. In this chapter, the authors introduce a...
Decision Trees Unleashed: Simplifying IoT Malware Detection With Advanced AI Techniques
Derek Mohammed, Marwan Omar. © 2024. 19 pages.
This chapter presents an in-depth study on the application of decision tree-based classifiers for the detection of malware in internet of things (IoT) environments. With the...
Organizational Dynamics and Bias in Artificial Intelligence (AI) Recruitment Algorithms
Marwan Omar, Darrell Norman Burrell. © 2024. 22 pages.
The integration of artificial intelligence (AI) into recruitment processes has promised to revolutionize and optimize the hiring landscape. However, recent legal proceedings have...
Management Practices for Mitigating Cybersecurity Threats to Biotechnology Companies, Laboratories, and Healthcare Research Organizations
Allison J. Huff, Darrell Norman Burrell, Calvin Nobles, Kevin Richardson, Jorja Brittany Wright, Sharon L. Burton, Angel J. Jones, Delores Springs, Marwan Omar, Kim L. Brown-Jackson. © 2023. 12 pages.
In the rapidly advancing landscape of biotechnology, laboratories, and healthcare research, the criticality of robust cybersecurity risk management techniques cannot be...
Analysis of Ultrasound Images in Kidney Failure Diagnosis Using Deep Learning
Naresh Tiwari, Yazeed Ghadi, Marwan Omar. © 2023. 30 pages.
Ultrasonic imaging has proven to be a valuable tool in kidney diagnosis, providing essential information about kidney size, shape, position, and function; and detecting...
Harnessing the Power and Simplicity of Decision Trees to Detect IoT Malware
Marwan Omar, Rebet Jones, Darrell Norman Burrell, Maurice Dawson, Calvin Nobles, Derek Mohammed, Ali Kashif Bashir. © 2023. 15 pages.
Due to its simple installation and connectivity, the internet of things (IoT) is susceptible to malware attacks. As IoT devices have become more prevalent, they have become the...
Brain Tumor Classification From Magnetic Resonance Imaging Using Deep Learning and Novel Data Augmentation
Naresh Tiwari, Marwan Omar, Yazeed Ghadi. © 2023. 22 pages.
The complex and time-consuming nature of magnetic resonance imaging (MRI) may make it difficult to autonomously diagnose tumors in the brain, possibly leading to erroneous...
Reverse-Engineering Malware
Marwan Omar, Luís Borges Gouveia, Jamal Al-Karaki, Derek Mohammed. © 2022. 24 pages.
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security defenses and secretly leaks confidential business data. One of the most pressing...
Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments
Latina Davis, Maurice Dawson, Marwan Omar. © 2021. 27 pages.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such...
Android Application Security
Marwan Omar, Derek Mohammed, Van Nguyen, Maurice Dawson, Mubarak Banisakher. © 2021. 16 pages.
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to...
Android Application Security
Marwan Omar, Derek Mohammed, Van Nguyen, Maurice Dawson, Mubarak Banisakher. © 2019. 22 pages.
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to...
The Future of National and International Security on the Internet
Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette. © 2019. 31 pages.
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even...
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette. © 2018. 32 pages.
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT)...
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson, Mohamed Eltayeb, Marwan Omar. © 2017. 347 pages.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This...
Enhancing Cyber Security for Financial Industry through Compliance and Regulatory Standards
Derek Mohammed, Marwan Omar, Van Nguyen. © 2017. 17 pages.
This paper investigates laws and regulations within the financial industry that are applicable to cybersecurity. It analyzes both compliance and regulatory issues across the...
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette. © 2017. 32 pages.
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT)...
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2016. 21 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an...
Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments
Latina Davis, Maurice Dawson, Marwan Omar. © 2016. 27 pages.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such...
Understanding the Methods behind Cyber Terrorism
Maurice Dawson, Marwan Omar, Jonathan Abramson. © 2015. 11 pages.
Preface
Maurice Dawson, Marwan Omar. © 2015. 3 pages.
This Preface is included in the book New Threats and Countermeasures in Digital Crime and Cyber Terrorism.
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2015. 22 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an...
Insider Threats: Detecting and Controlling Malicious Insiders
Marwan Omar. © 2015. 11 pages.
Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT...
Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
Marwan Omar. © 2015. 9 pages.
The focus of this chapter is to highlight and address security challenges associated with the use and adoption of cloud computing. The chapter will describe how cloud computing...
The Future of National and International Security on the Internet
Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette. © 2014. 30 pages.
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even...