Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Adel Abusitta"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 7, Iss 1, Pp 1-18 (2018)
Abstract Cloud Computing enables providers to rent out space on their virtual and physical infrastructures. Denial of Service (DoS) attacks threaten the ability of the cloud to respond to clients requests, which results in considerable economic losse
Externí odkaz:
https://doaj.org/article/2d2fd4bc42484bb79d71807e88a82a11
Autor:
Azzam Sleit, Adel Abusitta
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 2, Pp 24-32 (2007)
The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Various techniques including watermarking have been introduced in attempt to address these growing concerns. Most wa
Externí odkaz:
https://doaj.org/article/12db1644299448ed8a7debd1dae5fe0f
Autor:
Mohammad Esmaeilpour, Nourhene Chaalia, Adel Abusitta, Franşois-Xavier Devailly, Wissem Maazoun, Patrick Cardinal
Publikováno v:
Pattern Recognition Letters. 159:204-210
Autor:
Azzam Sleit, Adel Abusitta
Publikováno v:
International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence. 1:30-40
This paper introduces an NGram-based approach for digital images copyright protection. The advantage of the proposed approach compared to the existing works, is that it does not always require the whole elements (e.g., bits) of the watermark pattern
Publikováno v:
International Journal on Integrating Technology in Education. 10:9-22
E-learning platforms have never been as in-demand as they are now since the recent pandemic making privacy education more important than ever. However, for the most part, these platforms are single-user learning environments and lack student-student
Publikováno v:
2022 7th International Conference on Smart and Sustainable Technologies (SpliTech).
Publikováno v:
International Journal of Artificial Intelligence in Education. 31:726-768
Nowadays, privacy education plays an important role in teenagers’ lives. Since this domain is strongly linked to their social life, it is preferable to provide a collaborative learning environment that teaches privacy, and at the same time, allows
Autor:
Adel Abusitta, Glaucio H.S. de Carvalho, Omar Abdel Wahab, Talal Halabi, Benjamin C.M. Fung, Saja Al Mamoori
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Future Generation Computer Systems. 98:308-318
The last few years have witnessed the ability of cooperative cloud-based Intrusion Detection Systems (IDS) in detecting sophisticated and unknown attacks associated with the complex architecture of the Cloud. In a cooperative setting, an IDS can cons
Publikováno v:
Annals of Telecommunications. 74:637-653
The sophistication of the recent cloud computing systems has made them more vulnerable to intelligent cyber attacks. Moreover, it is becoming very difficult for a single intrusion detection system (IDS) to detect all existing attacks, due to limited