Zobrazeno 1 - 10
of 112
pro vyhledávání: '"Aldwairi, Monther"'
Many institutions and organizations require nostrification and verification of qualification as a prerequisite for hiring. The idea is to recognize the authenticity of a copy or digital document issued by an institution in a foreign country and detec
Externí odkaz:
http://arxiv.org/abs/2310.09136
Publikováno v:
14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022)
Recently, light has been shed on the trend of personalization, which comes into play whenever different search results are being tailored for a group of users who have issued the same search query. The unpalatable fact that myriads of search results
Externí odkaz:
http://arxiv.org/abs/2211.11518
Autor:
Almarzooqi, Alshaima, Mahmoud, Jawahir, Alzaabi, Bayena, Ghebremichael, Arsiema, Aldwairi, Monther
Publikováno v:
14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022)
The Domain Name System (DNS) is a core Internet service that translates domain names into IP addresses. It is a distributed database and protocol with many known weaknesses that subject to countless attacks including spoofing attacks, botnets, and do
Externí odkaz:
http://arxiv.org/abs/2211.08020
Autor:
Aldwairi, Monther
Publikováno v:
Global Journal of Engineering Education,Volume 24, Number 2, 2022
Distance education had existed for a long time, then it has undergone a renaissance with the advent of computers and the Internet. Distance education relied on physically delivered material and assessments to students, who work offline at home. More
Externí odkaz:
http://arxiv.org/abs/2208.12612
Autor:
Mukhaini, Fatema Al, Abdoulie, Shaikhah Al, Kharuosi, Aisha Al, Ahmad, Amal El, Aldwairi, Monther
Publikováno v:
THE IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY, 2022
Fake news existed ever since there was news, from rumors to printed media then radio and television. Recently, the information age, with its communications and Internet breakthroughs, exacerbated the spread of fake news. Additionally, aside from e-Co
Externí odkaz:
http://arxiv.org/abs/2208.07686
Publikováno v:
In Heliyon 29 February 2024 10(4)
Phishing emails are the first step for many of today's attacks. They come with a simple hyperlink, request for action or a full replica of an existing service or website. The goal is generally to trick the user to voluntarily give away his sensitive
Externí odkaz:
http://arxiv.org/abs/2004.09789
Publikováno v:
Journal of Parallel and Distributed Computing, 2020
With the growth of connectivity to smart grids, new applications, and the changing interaction between customer and energy clouds, clouds are more vulnerable to denial-of-service attacks. Efficient detection methods are required to authenticate, dete
Externí odkaz:
http://arxiv.org/abs/2004.04497
Publikováno v:
International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), 28-29th January 2018, Tamil Nadu, India
Network intrusion detection systems and antivirus software are essential in detecting malicious network traffic and attacks such as denial-of-service and malwares. Each attack, worm or virus has its own distinctive signature. Signature-based intrusio
Externí odkaz:
http://arxiv.org/abs/2003.00405
Publikováno v:
Seventh International Symposium on Security in Computing and Communications (SSCC'19), December 18-21, 2019, Trivandrum, Kerala, India
A drive by download is a download that occurs without users action or knowledge. It usually triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious program in the downloaded file installs itself on the victims ma
Externí odkaz:
http://arxiv.org/abs/2002.08007