Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Abdulghani Ali Ahmed"'
Autor:
Abdulghani Ali Ahmed, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, Abdullahi Gara Abdulrahman
Publikováno v:
Sensors, Vol 24, Iss 16, p 5210 (2024)
The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. I
Externí odkaz:
https://doaj.org/article/6f376017d7554a33a7d7ce5de8fd1836
Publikováno v:
Sensors, Vol 23, Iss 9, p 4284 (2023)
Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users’ confidential information, such as usernames, passwords, and financia
Externí odkaz:
https://doaj.org/article/4fc3287f8dcf4472bf5d31fabf552745
Autor:
Mohammed Binjubeir, Abdulghani Ali Ahmed, Mohd Arfian Bin Ismail, Ali Safaa Sadiq, Muhammad Khurram Khan
Publikováno v:
IEEE Access, Vol 8, Pp 20067-20079 (2020)
In recent years, the ever-mounting problem of Internet phishing has been threatening the secure propagation of sensitive data over the web, thereby resulting in either outright decline of data distribution or inaccurate data distribution from several
Externí odkaz:
https://doaj.org/article/60ef41a4f982485b8d4b92298c070109
Autor:
Wadha Abdullah Al-Khater, Somaya Al-Maadeed, Abdulghani Ali Ahmed, Ali Safaa Sadiq, Muhammad Khurram Khan
Publikováno v:
IEEE Access, Vol 8, Pp 137293-137311 (2020)
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child porn
Externí odkaz:
https://doaj.org/article/42507d0b80824c0595788394f0d81e73
Publikováno v:
IEEE Systems Journal. 15:727-737
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and
open access article Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan, conduct, and assess scientific research. However, publishing and processing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d99c285ec8a5edc45c26aabc7ca52f35
https://hdl.handle.net/2086/21814
https://hdl.handle.net/2086/21814
Publikováno v:
Neural Computing and Applications. 32:12221-12239
Existing classification techniques that are proposed previously for eliminating data inconsistency could not achieve an efficient parameter reduction in soft set theory, which effects on the obtained decisions. Meanwhile, the computational cost made
Autor:
Abdulghani Ali Ahmed
Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid developm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a5244d62778955b3b83a0704b8aab7c
https://doi.org/10.4018/978-1-7998-3025-2.ch015
https://doi.org/10.4018/978-1-7998-3025-2.ch015
Publikováno v:
Advanced Science Letters. 24:7348-7354
The ever-increasing growth of network computers and the internet of things makes botnet recognition become more difficult and it is making it all the more less difficult for intruders and attackers to propagate botnet infections. The unified propagat
Publikováno v:
Advanced Science Letters. 24:7388-7394
Active Queue Management (AQM) is an intelligent drop of network packets within the network routers as a result of buffer saturation to reduce network congestion. Random Early Detection (RED) mechanism is the most used mechanism among the existing AQM