Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Ahmed Aljughaiman"'
Publikováno v:
IEEE Access, Vol 12, Pp 173168-173191 (2024)
Android’s open-source nature has contributed to the platform’s rapid growth and its widespread adoption. However, this widespread adoption of the Android operating system (OS) has also attracted the attention of malicious actors who develop malwa
Externí odkaz:
https://doaj.org/article/4ebe23adb86c46f99ed08f768bf923e0
Publikováno v:
IEEE Access, Vol 12, Pp 134651-134671 (2024)
The increasing use of Wireless Sensor Networks (WSNs) is leading to network traffic growth as data exchange among WSN nodes increases. Protecting WSNs from Denial of Service (DoS) attacks is essential for enhancing data security and avoiding interrup
Externí odkaz:
https://doaj.org/article/0c6469f44e05475796ff682fc57f9619
Publikováno v:
IEEE Access, Vol 12, Pp 109560-109595 (2024)
The integration of the Internet of Things (IoT) and cloud computing, which play essential roles in our everyday routines, is expected to emerge as a fundamental element of the forthcoming internet, realizing increased usage and acceptance. This fusio
Externí odkaz:
https://doaj.org/article/242fa153e5a34d418553f919e6bf3f5e
Publikováno v:
Drones, Vol 8, Iss 4, p 153 (2024)
This paper presents a systematic literature review investigating the integration of lightweight blockchain and fog computing technologies to enhance the security and operational efficiency of drones. With a focus on critical applications such as mili
Externí odkaz:
https://doaj.org/article/10f85502ae0a48f6b0b90129721a5c3c
Autor:
Ahmed Aljughaiman
Publikováno v:
IEEE Access, Vol 11, Pp 112973-112987 (2023)
Researchers have achieved significant progress on the problem of Sensor Node Deployment (SND) in Underwater Acoustic Sensor Networks (UASNs) in terms of enhancing underwater communication. However, most studies focus on enhancing coverage, connectivi
Externí odkaz:
https://doaj.org/article/82ac6ce0cb9d413eb3d5cd5d78f25e38
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
Publikováno v:
Sensors, Vol 24, Iss 2, p 713 (2024)
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider a
Externí odkaz:
https://doaj.org/article/7aaf6b39f5dc4602ad31b602b4468a6d
Publikováno v:
Sensors, Vol 23, Iss 12, p 5569 (2023)
The Internet of Things (IoT) plays a critical role in remotely monitoring a wide variety of different application sectors, including agriculture, building, and energy. The wind turbine energy generator (WTEG) is a real-world application that can take
Externí odkaz:
https://doaj.org/article/64b0b2c4bad94273a1fab0f04ce09635
Publikováno v:
Sensors; Volume 23; Issue 12; Pages: 5569
The Internet of Things (IoT) plays a critical role in remotely monitoring a wide variety of different application sectors, including agriculture, building, and energy. The wind turbine energy generator (WTEG) is a real-world application that can take
Publikováno v:
Electronics. 11:3330
The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data,