Filters








55 Hits in 2.2 sec

Treatment of cancer patients in their last month of life: aimless chemotherapy

Tarek Assi, Elie El Rassy, Samer Tabchi, Toni Ibrahim, Tania Moussa, Ralph Chebib, Fadi El Karak, Fadi Farhat, Georges Chahine, Fadi Nasr, Marwan Ghosn, Joseph Kattan
2015 Supportive Care in Cancer  
Purpose The use of chemotherapy in the last month of life (CLML) of cancer patients is considered an aggressive approach to be avoided. We examined the practice of CLML in Lebanese cancer patients, and we investigated patient and tumor characteristics that justify this practice. To our knowledge, this is the first study describing CLML of Middle Eastern patients with advanced cancer. Methods We conducted this study at Hotel-Dieu de France University Hospital (HDF), Lebanon. Cases eligible for
more » ... is study were all individuals diagnosed with cancer who died at HDF between the 1st of January and the 31st of December 2014. Demographic and clinical characteristics of the patients were obtained from the hospital registration records. Data concerning the management plan, primary malignancy and stage, chemo-sensitivity, line, type, and timing of chemotherapy in the last month of life were also obtained. Results Among the 130 cancer patients who were enrolled, CLML was administered to a total of 55 patients (42.3 %), of whom 26 patients (50 %) received more than one cytotoxic drug. Oral drug was only given to 9 patients (16.4 %). Interestingly, CLML increased the risk of death in the last month of life (p=0.02), yet progression of disease constituted the major cause of death in this subgroup (54.6 %). The only variable to have statistical significant correlation with CLML was performance status (p = 0.03). The type of tumor and recent diagnosis of less than 2 months were also correlated to CLML (p=0.03 and 0.024, respectively). Conclusion The high percentage of patients receiving CLML underlines the difficulty of end-of-life discussions in patients from Middle Eastern societies. This is true in the context of a country with little availability of palliative care resources, where health policies should be more focused on incorporating palliative medicine in all medical strategies.
doi:10.1007/s00520-015-2959-3 pmid:26391890 fatcat:zphj4pmjdjhszptnqcyumnktaa

Integrating Security Services in Cloud Service Stores [chapter]

Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
2015 IFIP Advances in Information and Communication Technology  
Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business, and a fundamental element of both national and corporate cyber-security and Cloud strategies. Yet, Cloud IaaS and PaaS providers typically hold Cloud consumers accountable for protecting their applications, while Cloud users often find that protecting their proprietary system, application and
more » ... data stacks on public or hybrid Cloud environments can be complex, expensive and time-consuming. In this paper we describe a novel Cloud-based security management solution that empowers Cloud consumers to protect their systems, applications and data in the Cloud, whilst also improving the control and visibility of their Cloud security operations. This is achieved by enhancing the security policy management of commercial technologies, and via their integration with multiple Cloud-based hosts and applications. The result of this integration is then offered as a re-usable service across multiple Cloud platforms through a Cloud service store.
doi:10.1007/978-3-319-18491-3_19 fatcat:5upp7lt5pjbgxes5ya5hf5esjm

DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking

Tuan Anh Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, Mounir Ghogho, Fadi El Moussa
2020 Electronics  
Software Defined Networking (SDN) is developing as a new solution for the development and innovation of the Internet. SDN is expected to be the ideal future for the Internet, since it can provide a controllable, dynamic, and cost-effective network. The emergence of SDN provides a unique opportunity to achieve network security in a more efficient and flexible manner. However, SDN also has original structural vulnerabilities, which are the centralized controller, the control-data interface and
more » ... control-application interface. These vulnerabilities can be exploited by intruders to conduct several types of attacks. In this paper, we propose a deep learning (DL) approach for a network intrusion detection system (DeepIDS) in the SDN architecture. Our models are trained and tested with the NSL-KDD dataset and achieved an accuracy of 80.7% and 90% for a Fully Connected Deep Neural Network (DNN) and a Gated Recurrent Neural Network (GRU-RNN), respectively. Through experiments, we confirm that the DL approach has the potential for flow-based anomaly detection in the SDN environment. We also evaluate the performance of our system in terms of throughput, latency, and resource utilization. Our test results show that DeepIDS does not affect the performance of the OpenFlow controller and so is a feasible approach.
doi:10.3390/electronics9091533 doaj:f9e1c3d429e54c9b85cf3eb12fe5cd03 fatcat:mbeay5gl7jb27cdst6ls7dl7hi

Overview of SIP Attacks and Countermeasures [chapter]

Fadi El-moussa, Parmindher Mudhar, Andy Jones
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality
more » ... s traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
doi:10.1007/978-3-642-11530-1_10 fatcat:wcdg3iufjjcxvpryx5pnuuy7gi

Characteristic-based security analysis of personal networks

Andrew J. Paverd, Fadi El-Moussa, Ian Brown
2014 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication - UbiComp '14 Adjunct  
The rapid increase in smart devices and the development of mobile broadband communication technologies have given rise to the Personal Network (PN). The PN is logical user-centric network of interconnected components belonging to and/or used by a particular individual. The components of the PN include devices from the home network, the Personal Area Network (PAN), and the Vehicular Area Network (VAN) as well as cloud-based services. Previous security analyses have focussed on the various
more » ... l networks that make up the PN but have not provided an overall view of the PN itself. By consolidating this previous work, we present a comprehensive security analysis for the PN. Based on recent literature, we identify the primary characteristics of the components that make up the PN and of the PN itself. We use these to develop an abstract asset model of the PN. From this asset model, we derive the primary attacker objectives and motivation and compile a list of common attack vectors for the PN. We then present a mapping between the identified attacks and the characteristics of the PN components. This can be used to determine the exact attack vectors to which a specific component is vulnerable. We argue that this characteristic-based approach is better suited for use in the PN because of the high degree of heterogeneity between the PN components. Our overall contribution is a comprehensive security analysis for the PN and a methodological process that can be used for future analyses of similar systems. Another threat to networked systems is the potential for interruption of communication. This is also identified as an attack by ITU-T X.1111 [6] and Shabtai et al. [18] . This type of threat is an attack on the availability of information and services and in particular could be used to achieve the denial of service attack within the PN. For example, if a home network uses Wi-Fi communication, a device that generates electromagnetic interference could be used to interrupt the communication channels. Similarly if the network uses power-line communication, an attacker could introduce interference to block or degrade the quality of the communication links. This type of attack is not only limited to the physical communication channel as in the two previous examples. An attacker could also modify the device or network configuration to achieve a denial of service objective. 18
doi:10.1145/2638728.2641549 dblp:conf/huc/PaverdEB14 fatcat:es2vlilgr5gazfl46gntfynkmi

Detection of PIK3R1 (L449S) Mutation in a Patient with Ovarian Cancer: A Case Report

Salim Moussa, Fatima Saleh, Said El Shamieh, Tarek Assi, Ahmad Othman, Fadi Farhat
2020 Case Reports in Oncology  
Ovarian cancer (OC) is one of the most dangerous gynecological diseases and greatly increases the death risk worldwide. The heterogeneity of the ovarian tumors among patients and the lack of sufficient therapies for these tumors make the selection of the appropriate treatment a hard challenge. Understanding the mechanisms leading to OC becomes an urgent need in order to find out better therapeutic strategies. In this study, we have identified a point mutation (L449S) in the regulatory subunit
more » ... PI3K in an OC Lebanese patient. This genomic alteration had not been previously reported in OC and could plausibly enhance the PIK3CA amplification effect in strengthening AKT/mTOR pathway activity and leading to tumorigenesis.
doi:10.1159/000505723 pmid:32231543 pmcid:PMC7098360 fatcat:6lvwx52d5failgvhs5w4fuhmsq

Traumatic inferior hip dislocation: a rare adult case with ipsilateral bifocal hip fracture

Majd El Hajj Moussa, Charbel Tawk, Fadi Hoyek, Jean-Claude Lahoud
2016 Journal of Surgical Case Reports  
Inferior dislocation is a rare type of hip dislocation, especially in adults. Few cases have been reported; most of them were isolated. This is the case of a traumatic adult hip dislocation after a road traffic accident. Reduction was made under general anaesthesia; a CT-Scan after the reduction showed a bifocal non-displaced hip fracture. In this article, we present a small review of the literature and we discuss the possible mechanism of hip dislocation. We found through our case study that
more » ... is condition is not exclusive to children and CT-Scan is mandatory after the reduction of hip dislocation to eliminate any associated injury. To our knowledge, a bifocal hip fracture has not previously been documented, in the English language literature.
doi:10.1093/jscr/rjw056 pmid:27141043 pmcid:PMC4852974 fatcat:ih2hpybucbesffpcat6cz3lh7i

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture [chapter]

Pramod S. Pawar, Srijith K. Nair, Fadi El-Moussa, Theo Dimitrakos, Muttukrishnan Rajarajan, Andrea Zisman
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Security and trust in service providers is a major concern in the use of cloud services and the associated process of selecting a cloud service provider that meets the expectations and needs s is not easy. As a solution we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build its trust and security reputation
doi:10.1007/978-3-319-03874-2_11 fatcat:rxb4tjpidveitdfi5jqhxlgiym

Automated Detection of the Early Stages of Cyber Kill Chain

Ian Herwono, Fadi Ali El-Moussa
2018 Proceedings of the 4th International Conference on Information Systems Security and Privacy  
Early detection of cyber threats is critical for proactive network defence and protection against data, financial and reputation loss that could be caused by large-scale security breach. Continuous monitoring and in-depth analysis of related system and network events are required to achieve the objective. However cyber threat hunting activities are both time-consuming and labour-intensive; the prospect of being able to automate them effectively is thus worth exploring. In this paper we
more » ... the prototype of our attack detection tool for automating the process of discovering and correlating security events towards early threat detection. Its main objective is to facilitate continuous event monitoring and to alert security analysts whenever a series of detected events and activities may indicate early stages of a cyber kill chain. The process automation will reduce the load of human analysts and spare them valuable time to investigate more sophisticated, unknown attacks. We provide two use cases which describe the chain of tasks a security analyst would have to perform when investigating cyber incidents and trying to identify the systems targeted by potential attack. We then show how to create attack detection plans for those use cases and apply them on relevant datasets. We present the results produced by the tool and discuss our future work on contextaware classification of security events which aims to make the detection process more efficient.
doi:10.5220/0006543301820189 dblp:conf/icissp/HerwonoE18 fatcat:ff7izgrtuzb5vgzhwhwhov2lmm

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment

Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
To further support data sharing, Kang et al. proposed an Identity-Based Authentication scheme by which the owner can share his encrypted data stored in the cloud [7] while Zhao at el.  ... 
doi:10.1109/cns.2015.7346879 dblp:conf/cns/VuCASED15 fatcat:3f4h2h3xrzd6ridnkjukk6nx3m

A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs

Lotfi Mhamdi, Desmond McLernon, Fadi El-moussa, Syed Ali Raza Zaidi, Mounir Ghogho, Tuan Tang
2020 2020 IEEE Eighth International Conference on Communications and Networking (ComNet)  
Software Defined Networking (SDN) provides us with the capability of collecting network traffic information and managing networks proactively. Therefore, SDN facilitates the promotion of more robust and secure networks. Recently, several Machine Learning (ML)/Deep Learning (DL) intrusion detection approaches have been proposed to secure SDN networks. Currently, most of the proposed ML/DL intrusion detection approaches are based on supervised learning approach that required labelled and
more » ... nced datasets for training. However, this is time intensive and require significant human expertise to curate these datasets. These approaches cannot deal well with imbalanced and unlabeled datasets. In this paper, we propose a hybrid unsupervised DL approach using the stack autoencoder and One-class Support Vector Machine (SAE-1SVM) for Distributed Denial of Service (DDoS) attack detection. The experimental results show that the proposed algorithm can achieve an average accuracy of 99.35% with a small set of flow features. The SAE-1SVM shows that it can reduce the processing time significantly while maintaining a high detection rate. In summary, the SAE-1SVM can work well with imbalanced and unlabeled datasets and yield a high detection accuracy.
doi:10.1109/comnet47917.2020.9306073 fatcat:lsdz6jgf2faznah4ns3462q3ii

A nationwide non-interventional epidemiological data registry on myelodysplastic syndromes in Lebanon

Zaher K Otrock, Nabil Chamseddine, Ziad M Salem, Tarek Wehbe, Mouna Al-Ayoubi, Moussa Dhaini, Joseph Kattan, Walid Mokaddem, Therese Abi Nasr, Oussama Jradi, Fadi S Farhat, Mahmoud Wehbe (+14 others)
2015 American Journal of Blood Research  
Myelodysplastic syndromes (MDS) are a heterogeneous group of clonal hematopoietic disorders characterized by peripheral blood cytopenias, blood cells dysplasia, and increased risk for progression to acute leukemia.Physicians should be vigilant in diagnosing MDS and should be aware of the contemporary therapies that are always in progress. Most of the data on MDS epidemiology and management comes from developed countries. The incidence and features of MDS in the Arab countries, among them
more » ... , are not known. We undertook a nationwide epidemiological registry study of all newly diagnosed MDS cases through 2010-2011. Patients were referred by 21 hematologists/oncologists practicing in 17 hospitals and medical centers distributed across the entire country. 58 patients (29 males and 29 females) with confirmed MDS were included. The calculated incidence rate of MDS was 0.71 per 100,000 people. The median age at diagnosis was 73 years (range 16-86). The most common complaints on presentation were fatigue (70.7%), weakness (60.3%) and pallor (43.1%). Most patients were diagnosed as refractory anemia with excess blasts (RAEB; 36.2%) and refractory cytopenia with multilineage dysplasia (RCMD; 32.8%). This paper constitutes the first epidemiological report on the incidence and specific subtypes of MDS in Lebanon.
pmid:27069756 pmcid:PMC4769350 fatcat:eu3fmuedd5bodjg4e5wen22qfa

Foreword: Towards Trusted Cloud Ecosystems [chapter]

Theo Dimitrakos
2015 IFIP Advances in Information and Communication Technology  
In the third paper, Joshua Daniel and Fadi El-Moussa focus on innovations that enable organizations to enforce homogeneous security, patching and application management policies across multiple Cloud environments  ... 
doi:10.1007/978-3-319-18491-3_17 fatcat:kzoy3xccnzbwbg6h5uyfgrsxn4

Consociationalism, Clientelism, and Local Politics in Beirut: Between Civic and Sectarian Identities

Stephen Deets
2018 Nationalism & Ethnic Politics  
Ghrayeb 1,315 Fadi Hnein 1,751 Adel Abou Rjeily 1,632 Walid Boustany 1,600 Nadim Assaf 1,529 Wissam Moussa 1,582 George Jurdi 1,528 Sobhi Boueiz 1,413 Elie George Khoury 1,464  ...  1,623 Ziad El-Qari 1,537 Imad Mousallem 1,534 Wouroud Sharif 1,527 Mostafa Moussa 1,449 Nasr Shamma 1,448 Ziad Trad 1,443 Youssef Malak 1,069 Independent candidates Free Patriotic  ... 
doi:10.1080/13537113.2018.1457817 fatcat:44mry5iwp5do7hunt7dkmshnvu

BMC Nephrology reviewer acknowledgement 2012

Hayley Henderson
2013 BMC Nephrology  
Fakhouri France Stanley Fan United Kingdom Robert Fassett Australia Ben Moussa Fatma Tunisia Sarah Faubel USA Mariano Feriani Italy Giuseppe Ferrante Italy Inês Ferreira Portugal  ...  Pasquale Esposito Italy Vittoria Esposito Italy Michelle Estrella USA Joseph Eustace Ireland Tevfik Rifki Evrenkaya Turkey Fabio Fabbian Italy Stephen Fadem USA Jeffrey Fadrowski USA Fadi  ... 
doi:10.1186/1471-2369-14-61 fatcat:36qyzcyrgvemjkwmudz5mx6tjy
« Previous Showing results 1 — 15 out of 55 results