Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Asma A. Alhashmi"'
Autor:
Mohammed Aljebreen, Hanan Abdullah Mengash, Khalid Mahmood, Asma A. Alhashmi, Ahmed S. Salama
Publikováno v:
AIMS Mathematics, Vol 9, Iss 6, Pp 15796-15818 (2024)
Internet of Things (IoT) security is an umbrella term for the strategies and tools that protect devices connected to the cloud, and the network they use to connect. The IoT connects different objects and devices through the internet to communicate wi
Externí odkaz:
https://doaj.org/article/5ca12af7ac0b4d0cb5472c6a741e7cd0
Autor:
Fatma S. Alrayes, Nadhem Nemri, Nouf Aljaffan, Asma Alshuhail, Asma A. Alhashmi, Ahmed Mahmud
Publikováno v:
IEEE Access, Vol 12, Pp 132434-132443 (2024)
Cybersecurity continues to be a significant problem for all industries involved in digital activities, and it is specified as the cyclical surge in security occurrences. Considering more Internet of Things (IoT) devices are being employed in the medi
Externí odkaz:
https://doaj.org/article/abd2a6c375a24ee183a109690811c1bd
Autor:
Fahad F. Alruwaili, Manal Abdullah Alohali, Nouf Aljaffan, Asma A. Alhashmi, Ahmed Mahmud, Mohammed Assiri
Publikováno v:
IEEE Access, Vol 12, Pp 14146-14156 (2024)
The fast development of smart home devices and the Internet of Things (IoTs) presents unprecedented accessibility into our day-to-day lives; however, it has also increased major problems regarding security and privacy. A smart home network is a vital
Externí odkaz:
https://doaj.org/article/9d082424c9704a659d0abbc82c6cc02b
Autor:
Abdulbasit A. Darem, Asma A. Alhashmi, Aloyoun M. Almadani, Ali K. Alanazi, Geraldine A. Sutantra
Publikováno v:
Egyptian Journal of Remote Sensing and Space Sciences, Vol 26, Iss 2, Pp 341-350 (2023)
The land use and land cover study (LULC) play an essential role in regional socio-economic development and natural resource management to develop sustainable development in vegetation changes, water quantity and quality, land resources, and coastal m
Externí odkaz:
https://doaj.org/article/82942dec24244101b71c6b6dde680221
Autor:
Abdulbasit A. Darem, Asma A. Alhashmi, Tareq M. Alkhaldi, Abdullah M. Alashjaee, Sultan M. Alanazi, Shouki A. Ebad
Publikováno v:
IEEE Access, Vol 11, Pp 125138-125158 (2023)
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex an
Externí odkaz:
https://doaj.org/article/91cb9d1af311494a897df620ad168515
Autor:
Asma A. Alhashmi, Abdulbasit A. Darem, Abdullah M. Alashjaee, Sultan M. Alanazi, Tareq M. Alkhaldi, Shouki A. Ebad, Fuad A. Ghaleb, Aloyoun M. Almadani
Publikováno v:
Mathematics, Vol 11, Iss 13, p 2944 (2023)
This study presents a novel Similarity-Based Hybrid API Malware Detection Model (HAPI-MDM) aiming to enhance the accuracy of malware detection by leveraging the combined strengths of static and dynamic analysis of API calls. Faced with the pervasive
Externí odkaz:
https://doaj.org/article/032fecc1d942488a80416ce94b247cf4
Publikováno v:
Sensors, Vol 21, Iss 4, p 1374 (2021)
Malicious software (“malware”) has become one of the serious cybersecurity issues in Android ecosystem. Given the fast evolution of Android malware releases, it is practically not feasible to manually detect malware apps in the Android ecosystem.
Externí odkaz:
https://doaj.org/article/89e3c791972a4c4c92849d1503d79e7b
Autor:
Almadani, Asma A. Alhashmi, Abdulbasit A. Darem, Abdullah M. Alashjaee, Sultan M. Alanazi, Tareq M. Alkhaldi, Shouki A. Ebad, Fuad A. Ghaleb, Aloyoun M.
Publikováno v:
Mathematics; Volume 11; Issue 13; Pages: 2944
This study presents a novel Similarity-Based Hybrid API Malware Detection Model (HAPI-MDM) aiming to enhance the accuracy of malware detection by leveraging the combined strengths of static and dynamic analysis of API calls. Faced with the pervasive
Autor:
Abdulbasit Darem, Asma A. Alhashmi
Publikováno v:
Computer Systems Science and Engineering. 41:241-254
Publikováno v:
Future Generation Computer Systems. 125:314-323
Malicious software (malware) is a major threat to the systems and networks’ security. Although anti-malware products are used to protect systems and networks against malware attacks, obfuscated malware that is capable of evading analysis and detect