Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Abdelfattah Amamra"'
Autor:
Mostefa Kara, Abdelkader Laouid, Muath AlShaikh, Mohammad Hammoudeh, Ahcene Bounceur, Reinhardt Euler, Abdelfattah Amamra, Brahim Laouid
Publikováno v:
Applied Sciences, Vol 11, Iss 15, p 6750 (2021)
Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) co
Externí odkaz:
https://doaj.org/article/40c88515776a4075abcf50b70a355420
Autor:
Tamer Omar, Abdelfattah Amamra, Thomas Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 14:1-14
The 5G self-organizing network is a viable solution to the problem of increasing user-connectivity, data rates, and network complexity. This paper proposes a SON solution that uses machine learning for anomaly detection in order to meet user demands.
Publikováno v:
Smart and Sustainable Built Environment. 10:90-105
PurposeThe purpose of this paper is to propose a distributed deep learning architecture for smart cities in big data systems.Design/methodology/approachWe have proposed an architectural multilayer to describe the distributed deep learning for smart c
Publikováno v:
2020 ASEE Virtual Annual Conference Content Access Proceedings.
Autor:
Abdelkader Laouid, Abdelfattah Amamra, Ahcène Bounceur, Reinhardt Euler, Brahim Laouid, Mostefa Kara, Muath AlShaikh, Mohammad Hammoudeh
Publikováno v:
Applied Sciences, Vol 11, Iss 6750, p 6750 (2021)
Applied Sciences
Volume 11
Issue 15
Applied Sciences
Volume 11
Issue 15
Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) co
Publikováno v:
Security and Communication Networks. 9:3483-3495
Anomaly-based detection techniques have been widely studied in recent years. Most of these efforts have focused to improve the accuracy of these techniques. The poor accuracy performance is caused by two factors: i the data used for the analysis is i
Publikováno v:
ISCC
Underwater sensor networks are bounded by data sensing, transmitting, and forwarding limitations. The transmitting of large volumes of data can require a large amount of time and power. This has led researchers to focus on the new technology of under
Publikováno v:
Security and Communication Networks. 8:1179-1192
Improving anomaly-based malware detection techniques has been widely studied in recent years. Most of these efforts have focused on the dataset available for analysis and/or the algorithms used to distinguish between normal or abnormal behavior. Thes
Publikováno v:
Trust Management VII ISBN: 9783642383229
IFIPTM
IFIPTM
Improving Smartphone anomaly-based malware detection techniques is widely studied in recent years. Previous studies explore three factors: dataset size, dataset type and normal profile model. These factors improve the performance, but increase comput
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e8263974f81961512c6f6f48fdb6b947
https://doi.org/10.1007/978-3-642-38323-6_12
https://doi.org/10.1007/978-3-642-38323-6_12
Publikováno v:
BWCCA
Dramatic increase of smartphones malwares has imposed adopting malware detection solution for them. Signature-based technique is widely used in commercial Antivirus and it is based on multi-pattern matching algorithms. In this paper, we discuss sever