Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Abdulrahman Alharby"'
Publikováno v:
Journal of Network and Computer Applications. 64:176-193
A wireless sensor network (WSN) is composed of a large number of sensor nodes, relay nodes, and a base station, that are deployed in an environment to collect information. WSNs are getting more widespread use and have been adapted to a vast array of
Autor:
Shahad Abdulaziz Dahdouh, Hanan Abdullah Alshehri, Basstaa Mohammad Alsubaie, Afnan Mohammed Alghamdi, Abdulrahman Alharby, Norah Ahmed Almubairik, Khalid Alissa
Publikováno v:
2018 21st Saudi Computer Society National Computer Conference (NCC).
Human is the weakest link in information security. Even with strong cyber security policies an organization can still be hacked because of a human error. Even if people are aware of the policies and their importance they might not behave accordingly.
Autor:
Mehtab Mehdi, Abdulrahman Alharby
The purpose of this chapter is to concentrate on the technical considerations of wearable technologies. Approximately 50% of this chapter will be based on technical considerations while 30% is based on study areas, universities, degrees, and other in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7449fd50d300a044bf7dca4e76fa7f9
https://doi.org/10.4018/978-1-5225-5484-4.ch001
https://doi.org/10.4018/978-1-5225-5484-4.ch001
Publikováno v:
Third International Conference on Advances in Computing, Electronics and Communication - ACEC 2015.
Publikováno v:
Third International Conference on Advances in Computing, Electronics and Communication - ACEC 2015.
Autor:
Hideki Imai, Abdulrahman Alharby
Publikováno v:
IEICE Transactions on Information and Systems. :189-200
Security protocols flaws represent a substantial portion of security exposures of data networks. In order to evaluate security protocols against any attack, formal methods are equipped with a number of techniques. Unfortunately, formal methods are ap
Publikováno v:
2009 International Conference on Information and Communication Technologies.
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, div
Autor:
Abdulrahman Alharby, Hideki Imai
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783540262237
ACNS
ACNS
Intrusion Detection Systems (IDSs) are widely deployed in computer networks to stand against a wide variety of attacks. IDSs deployment raises a serious problem, namely managing of a large number of triggered alerts. This problem becomes worse by the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::84fbb5eb269b45dc65a582f8c4156d39
https://doi.org/10.1007/11496137_14
https://doi.org/10.1007/11496137_14
Autor:
Abdulrahman Alharby, Hideki Imai
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540291138
MMM-ACNS
MMM-ACNS
An algorithm for designing hybrid intrusion detection system based on behavior analysis technique is proposed. This system can be used to generate attack signatures and to detect anomalous behavior. The approach can distinguish the order of attack be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7be9cb4af54a91744e5ed0c92bd35053
https://doi.org/10.1007/11560326_27
https://doi.org/10.1007/11560326_27