Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Abdullah I. A. Alzahrani"'
Autor:
Ala Abdulsalam Alarood, Muhammad Faheem, Mahmoud Ahmad Al‐Khasawneh, Abdullah I. A. Alzahrani, Abdulrahman A. Alshdadi
Publikováno v:
Healthcare Technology Letters, Vol 10, Iss 4, Pp 87-98 (2023)
Abstract Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high‐level secur
Externí odkaz:
https://doaj.org/article/757294c308dc41f09a110a759433936a
Detection of Android Malware Using Machine Learning and Siamese Shot Learning Technique for Security
Autor:
Fahdah A. Almarshad, Mohammed Zakariah, Ghada Abdalaziz Gashgari, Eman Abdullah Aldakheel, Abdullah I. A. Alzahrani
Publikováno v:
IEEE Access, Vol 11, Pp 127697-127714 (2023)
Android malware security tools that can swiftly identify and categorize various malware classes to create rapid response strategies have been trendy in recent years. Although many application fields have demonstrated the usefulness of implementing Ma
Externí odkaz:
https://doaj.org/article/c1beea5e2fa6443b996f4216e2b685de
Publikováno v:
IEEE Access, Vol 11, Pp 107348-107368 (2023)
Credit card use poses a significant security issue on a global scale, with rule-based algorithms and traditional anomaly detection being two of the most often used methods. However, they are resource-intensive, time-consuming, and erroneous. Given fe
Externí odkaz:
https://doaj.org/article/705ffb5c908042bbb93460363a0420ea
Autor:
Eman Abdullah Aldakheel, Mohammed Zakariah, Ghada Abdalaziz Gashgari, Fahdah A. Almarshad, Abdullah I. A. Alzahrani
Publikováno v:
Sensors, Vol 23, Iss 9, p 4403 (2023)
Organizations and individuals worldwide are becoming increasingly vulnerable to cyberattacks as phishing continues to grow and the number of phishing websites grows. As a result, improved cyber defense necessitates more effective phishing detection (
Externí odkaz:
https://doaj.org/article/9cee51f6d7db41be92e6f1b199da2103
Autor:
Amal Al-Rasheed, Amel Ksibi, Manel Ayadi, Abdullah I. A. Alzahrani, Mohammed Zakariah, Nada Ali Hakami
Publikováno v:
Diagnostics, Vol 12, Iss 12, p 3145 (2022)
Skin cancer is one of the most severe forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, diagnosing and treating skin cancer patients at an early stage is crucial. Since a manual skin cancer diagnosis
Externí odkaz:
https://doaj.org/article/4ac1af4076934827ac4b04150fcd2f79
Publikováno v:
Electronics; Volume 12; Issue 12; Pages: 2590
Wastewater management is a mechanism that is used to extract and refine pollutants from wastewater or drainage that can be recycled to the water supply with minimal environmental effects. New methods and techniques are required to ensure safe and sma
Publikováno v:
Contrast Media & Molecular Imaging.
Skin cancer is one of the most serious forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, it is crucial to diagnose and treat skin cancer patients at an early stage. Due to the fact that a manual diag
Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things
Autor:
Abdullah I. A. Alzahrani, Amal Al-Rasheed, Amel Ksibi, Manel Ayadi, Mashael M. Asiri, Mohammed Zakariah
Publikováno v:
Electronics; Volume 11; Issue 23; Pages: 4017
Devices which are part of the Internet of Things (IoT) have strong connections; they generate and consume data, which necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decision
Publikováno v:
Electronics; Volume 11; Issue 23; Pages: 3880
The coronavirus disease pandemic (COVID-19) is a contemporary disease. It first appeared in 2019 and has sparked a lot of attention in the public media and recent studies due to its rapid spread around the world in recent years and the fact that it h
Publikováno v:
Electronics; Volume 11; Issue 22; Pages: 3665
malware is malicious software (harmful program files) that targets and damage computers, devices, networks, and servers. Many types of malware exist, including worms, viruses, trojan horses, etc. With the increase in technology and devices every day,