Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Abdullah Alomari"'
Autor:
Amal Ezz-Eldien, Mohamed Ezz, Amjad Alsirhani, Ayman Mohamed Mostafa, Abdullah Alomari, Faeiz Alserhani, Mohammed Mujib Alshahrani
Publikováno v:
PLoS ONE, Vol 19, Iss 11, p e0311782 (2024)
This paper addresses the computational methods and challenges associated with prime number generation, a critical component in encryption algorithms for ensuring data security. The generation of prime numbers efficiently is a critical challenge in va
Externí odkaz:
https://doaj.org/article/7427847156ee48bda9c56df938a1a2e5
Autor:
Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, Mamoona Humayun
Publikováno v:
IEEE Access, Vol 11, Pp 62697-62720 (2023)
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and
Externí odkaz:
https://doaj.org/article/956c82ac84e947d4a8dda6adac91a0e6
Autor:
Insaf Ullah, Abdullah Alomari, Ako Muhammad Abdullah, Neeraj Kumar, Amjad Alsirhani, Fazal Noor, Saddam Hussain, Muhammad Asghar Khan
Publikováno v:
IEEE Access, Vol 10, Pp 105182-105194 (2022)
The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough comprehension
Externí odkaz:
https://doaj.org/article/66c094a80db54d3c87c7d68fa92edac9
Autor:
Faheem Khan, Abdullah A. Al-Atawi, Abdullah Alomari, Amjad Alsirhani, Mohammed Mujib Alshahrani, Jawad Khan, Youngmoon Lee
Publikováno v:
Mathematics, Vol 10, Iss 19, p 3686 (2022)
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a
Externí odkaz:
https://doaj.org/article/59e9e78eb0674bf5950241d4567b2fbe
Autor:
Sunil Kaushik, Akashdeep Bhardwaj, Abdullah Alomari, Salil Bharany, Amjad Alsirhani, Mohammed Mujib Alshahrani
Publikováno v:
Computers, Vol 11, Iss 10, p 142 (2022)
The increase in internet connectivity has led to an increased usage of the Internet of Things (IoT) and devices on the internet. These IoT devices are becoming the backbone of Industry 4.0. The dependence on IoT devices has made them vulnerable to cy
Externí odkaz:
https://doaj.org/article/d20b368ca9be4b4fbde2bb81da0c629b
Autor:
Sana Javed, Muhammad Asghar Khan, Ako Muhammad Abdullah, Amjad Alsirhani, Abdullah Alomari, Fazal Noor, Insaf Ullah
Publikováno v:
Drones, Vol 6, Iss 10, p 264 (2022)
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the o
Externí odkaz:
https://doaj.org/article/c1ce3905c4c74b97b8782c347f6c8968
Autor:
Farhan Ullah, Amjad Alsirhani, Mohammed Mujib Alshahrani, Abdullah Alomari, Hamad Naeem, Syed Aziz Shah
Publikováno v:
Sensors, Vol 22, Iss 18, p 6766 (2022)
Android has become the leading mobile ecosystem because of its accessibility and adaptability. It has also become the primary target of widespread malicious apps. This situation needs the immediate implementation of an effective malware detection sys
Externí odkaz:
https://doaj.org/article/843b525acd5a4df8abb332aadb7d4a77
Publikováno v:
IEEE Access, Vol 6, Pp 22368-22385 (2018)
In many applications of wireless sensor networks (WSNs), node location is required to locate the monitored event once occurs. Mobility-assisted localization has emerged as an efficient technique for node localization. It works on optimizing a path pl
Externí odkaz:
https://doaj.org/article/cb5c12293bda47cc8ba4e897e2b0b097
Publikováno v:
Sensors, Vol 17, Iss 8, p 1904 (2017)
Mobile anchor path planning techniques have provided as an alternative option for node localization in wireless sensor networks (WSNs). In such context, path planning is a movement pattern where a mobile anchor node’s movement is designed in order
Externí odkaz:
https://doaj.org/article/a4ff0b1ca3a24991a61b40a735f01e3d
Publikováno v:
Traitement du Signal. 39:991-1003
The incidence of malicious threats to computer systems has increased with the increasing use of Android devices and high-speed Internet. Malware visualization mechanism can analyze a computer whenever a software or system crash occurs because of mali