Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Ahmad M. Manasrah"'
Publikováno v:
Journal of Engineering Science and Technology, Vol 13, Iss 11, Pp 3473-3488 (2018)
Recently, Information hiding has an important role to protect data via the Internet from malicious attack, Steganography - which is the art of hiding data- uses a cover file to hide data by utilizing different schemas to prevent it from being detecte
Externí odkaz:
https://doaj.org/article/7caf787416204bd3895371b8ce5fdb0d
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 29, Iss 3, Pp 365-377 (2017)
Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the end user.
Externí odkaz:
https://doaj.org/article/8c0b75b918fd4801b181403a771c519c
Publikováno v:
Webology. 17:817-826
In order to develop the cryptographic systems, it must always find new techniques to construct the strong cryptosystem, the proposed method try to employ the nature and animals activates in their society to propose the new algorithm for new cryptosys
Publikováno v:
International Journal of Machine Learning and Computing. 9:458-464
Autor:
Hanan Ba Ali, Ahmad M. Manasrah
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2018 (2018)
Cloud computing environment provides several on-demand services and resource sharing for clients. Business processes are managed using the workflow technology over the cloud, which represents one of the challenges in using the resources in an efficie
Publikováno v:
Cluster Computing. 22:1639-1653
A cloud service provider (CP) offers computing resources with their own interface type and pricing policies besides other services such as storage on a pay-per-use model. Client’s requests should be processed in an appropriate CP datacenters in a t
Autor:
Mustafa Banikhalaf, Nabhan Hamadneh, Ahmed Al-Dubai, Ahmed Aleroud, Ahmad Qawasmeh, Ahmad M. Manasrah
Recently, Internet of Vehicles (IoVs) has been recognised as a key solution for vehicular communications. Connected vehicles and infrastructure' roadside units have been shaping the underlying architecture of IoVs technology, where the conventional r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::151930912084ef099f92afd60b7d1f00
Autor:
Basim Najim Al-din, Ahmad M. Manasrah
Publikováno v:
Security and Communication Networks. 9:1450-1461
Caesar cipher is a mono alphabetic cipher. It is also a type of substitution cipher in which each letter in the plaintext is “shifted” a certain number of places down the alphabet. However, Caesar cipher method did not last long because of its si
Publikováno v:
Neural Computing and Applications. 28:1541-1558
Botnet is a thorny and a grave problem of today's Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots. It is also wo
Publikováno v:
International Journal of Advanced Intelligence Paradigms. 15:357
Despite the efforts in combating the threat of botnets, they still grow in size and evasion techniques. The bot software is written once and spreads to other machines all over the world. The bot software is preconfigured to locate the malicious domai