Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Ammar Aldallal"'
Publikováno v:
Sensors, Vol 23, Iss 3, p 1383 (2023)
In this study, the influence of adopting Reinforcement Learning (RL) to predict the channel parameters for user devices in a Power Domain Multi-Input Single-Output Non-Orthogonal Multiple Access (MISO-NOMA) system is inspected. In the channel predict
Externí odkaz:
https://doaj.org/article/228cf71c86bf4515bfacc4821208a81a
Autor:
Ammar Aldallal
Publikováno v:
Symmetry, Vol 14, Iss 9, p 1916 (2022)
The increased adoption of cloud computing resources produces major loopholes in cloud computing for cybersecurity attacks. An intrusion detection system (IDS) is one of the vital defenses against threats and attacks to cloud computing. Current IDSs e
Externí odkaz:
https://doaj.org/article/dc9f48989ed44a10b67407443fb340bc
Publikováno v:
Symmetry, Vol 14, Iss 7, p 1461 (2022)
As cyber-attacks become remarkably sophisticated, effective Intrusion Detection Systems (IDSs) are needed to monitor computer resources and to provide alerts regarding unusual or suspicious behavior. Despite using several machine learning (ML) and da
Externí odkaz:
https://doaj.org/article/972db7bd990c47adb576f0996e5a848a
Publikováno v:
Sensors, Vol 22, Iss 10, p 3666 (2022)
In a non-orthogonal multiple access (NOMA) system, the successive interference cancellation (SIC) procedure is typically employed at the receiver side, where several user’s signals are decoded in a subsequent manner. Fading channels may disperse th
Externí odkaz:
https://doaj.org/article/77e1e193091b495e9d356187d075d38e
Autor:
Ammar Aldallal, Faisal Alisa
Publikováno v:
Symmetry, Vol 13, Iss 12, p 2306 (2021)
When adopting cloud computing, cybersecurity needs to be applied to detect and protect against malicious intruders to improve the organization’s capability against cyberattacks. Having network intrusion detection with zero false alarm is a challeng
Externí odkaz:
https://doaj.org/article/6aa84df61dc14765b724bc889cb0e41e
Publikováno v:
2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN).
Publikováno v:
Arabian Journal of Geosciences. 15
Autor:
Dr. AMMAR ALDALLAL, Dr. KASHIF SHABBIR
Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days of Internet penetration. JavaScript, a programming language developed by Netscape, came into being around the same time. The noble intention of this pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::310988ea54f5d5a76257c8cc7c4393b1
Data mining is a relatively new field of research whose major function retrieve knowledge from a large amount of data. It is a process of selecting, exploring, and modeling large amounts of data to discover unknown patterns. Modernization and commerc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7d65705464bda1c83a739ffad9765f17
Autor:
RS Al Jassim, Ammar Aldallal
Publikováno v:
Exhibition.