Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Abeer Tariq Maolood"'
Publikováno v:
Symmetry, Vol 16, Iss 7, p 872 (2024)
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption Standard, makes them more vulnerable to attacks. This proposal presents a
Externí odkaz:
https://doaj.org/article/8a9a1d314a8948dd89d773f5e5a49508
Publikováno v:
Wasit Journal of Computer and Mathematics Science (2021)
Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance comp
Externí odkaz:
https://doaj.org/article/a6d2b27d94bf4f5f950c0bcb540a6600
Autor:
Abeer Tariq Maolood1 110032@uotechnology.edu.iq, Ala'a Talib Khudhair1
Publikováno v:
Iraqi Journal of Science. 2018, Vol. 59 Issue 3B, p1518-1530. 13p.
Autor:
Abeer Tariq Maolood, Alaa Kadhim Farhan, Wageda I. El-Sobky, Hany Nasry Zaky, Hossam L. Zayed, Hossam E. Ahmed, Tamer O. Diab
Publikováno v:
Security and Communication Networks.
IoT is one of the most popular technologies in recent years due to the interconnection of various infrastructures, physical devices, and software. To guarantee the security of Internet of Things (IoT) pervasiveness, lightweight cryptographic solution
Publikováno v:
2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::397e87ff6ed7230708db73c49b804134
https://zenodo.org/record/7069292
https://zenodo.org/record/7069292
Publikováno v:
Wasit Journal of Computer and Mathematics Science. 1:66-83
Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance comp
Autor:
Alaa Kadhim Farhan, Nadia M.G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr, Iqtadar Hussain
Publikováno v:
Entropy, Vol 21, Iss 10, p 958 (2019)
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly ana
Externí odkaz:
https://doaj.org/article/7fdd976dd75d4b20969f268cfbfc0736
Publikováno v:
Tikrit Journal of Pure Science. 25:114-125
Block encryption algorithms rely on the two most important features of their complexity and ease of use to support security requirements (confidentiality, data integrity, and non-repudiation) to prevent unauthorized users from entering the system and
Publikováno v:
Materials Today: Proceedings.
In this paper, a medical platform has architecture that depends on middleware and database supports people with Coronavirus, and this platform mainly relies on three users. The first person is the administrator, who is separated into two groups of us