Zobrazeno 1 - 10
of 172
pro vyhledávání: '"Alrabaee A"'
Autor:
Muhusina Ismail, Nisha Thorakkattu Madathil, Meera Alalawi, Saed Alrabaee, Mohammad Al Bataineh, Suhib Melhem, Djedjiga Mouheb
Publikováno v:
Computers in Human Behavior Reports, Vol 16, Iss , Pp 100501- (2024)
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of suc
Externí odkaz:
https://doaj.org/article/350ecbec3a9e4a6cb96eb254dafc994a
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 3, Pp 676-692 (2024)
In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception, ensuring the quality of service, preven
Externí odkaz:
https://doaj.org/article/604854ec6aeb44dc97dc5be14927c778
Autor:
Ismail, Muhusina a, Madathil, Nisha Thorakkattu a, Alalawi, Meera a, Alrabaee, Saed a, ⁎, Al Bataineh, Mohammad b, c, Melhem, Suhib d, Mouheb, Djedjiga e
Publikováno v:
In Computers in Human Behavior Reports December 2024 16
Publikováno v:
In Forensic Science International: Digital Investigation July 2024 49 Supplement
Publikováno v:
In Digital Communications and Networks June 2024 10(3):676-692
Autor:
AlDaajeh, Saleh, Alrabaee, Saed
Publikováno v:
In Computers & Security June 2024 141
Publikováno v:
In Heliyon 15 January 2024 10(1)
Publikováno v:
Heliyon, Vol 10, Iss 1, Pp e23332- (2024)
Trust has emerged as a pillar in the acceptance and use of new technologies in the ever-changing digital landscape, notably in the booming field of social commerce. The importance of this study lies in the fact that it explores in-depth the aspects o
Externí odkaz:
https://doaj.org/article/5905bbdb4f204e058ea19f6c6489e9c4
Autor:
Heba Saleous, Muhusina Ismail, Saleh H. AlDaajeh, Nisha Madathil, Saed Alrabaee, Kim-Kwang Raymond Choo, Nabeel Al-Qirim
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 1, Pp 211-222 (2023)
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemi
Externí odkaz:
https://doaj.org/article/6a6152efdcca4dd585c5709cc6eba554
Publikováno v:
IEEE Access, Vol 11, Pp 71097-71112 (2023)
Cognitive Radio Networks (CRNs) have been proposed as a solution to the problem of spectrum scarcity in wireless communication systems. CRNs allow for dynamic spectrum access by secondary users, who can opportunistically use the spectrum when it is n
Externí odkaz:
https://doaj.org/article/6ce3ae969d504739a1ab1ec19904700c