Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Bader Alwasel"'
Publikováno v:
IEEE Access, Vol 12, Pp 44069-44079 (2024)
The versatility and diverse applications of IoT-based Heterogeneous WSN (HWSN) technologies make them valuable tools for achieving sustainability goals in Sustainable Smart Cities (SSCs). Proper management of underlying heterogeneous architecture is
Externí odkaz:
https://doaj.org/article/71f3562ade2b4877b64e31d60880b9c5
Publikováno v:
IEEE Access, Vol 11, Pp 46487-46503 (2023)
The Internet of Vehicles (IoV) has evolved from the classic Vehicular Ad-hoc NETworks (VANETs) as a result of the emergence of the Internet of Things (IoT). IoV is used for communication among vehicles in real-time with their drivers, other vehicles,
Externí odkaz:
https://doaj.org/article/6718805662c24d7d8fd9e9017143a869
Autor:
Bader Alwasel, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti, Mohammed Alsuhaibani
Publikováno v:
Applied Sciences, Vol 13, Iss 13, p 7774 (2023)
In the dynamic and ever-evolving realm of network security, the ability to accurately identify and classify portscan attacks both inside and outside networks is of paramount importance. This study delves into the underexplored potential of fusing gra
Externí odkaz:
https://doaj.org/article/05c3a752fe6d489ebf23c0f6d41e9b31
Publikováno v:
Sensors, Vol 23, Iss 12, p 5433 (2023)
Wireless Sensor Networks (WSNs) have been successfully utilized for developing various collaborative and intelligent applications that can provide comfortable and smart-economic life. This is because the majority of applications that employ WSNs for
Externí odkaz:
https://doaj.org/article/b5e7caa896d04dccbaedcebf3305f544
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 12, Iss 2, p 34 (2023)
There are many different fields in which wireless sensor networks (WSNs) can be used such as environmental monitoring, healthcare, military, and security. Due to the vulnerability of WSNs, reliability is a critical concern. Evaluation of a WSN’s re
Externí odkaz:
https://doaj.org/article/49aab19e8c644fb2baac37a0467fda74
Autor:
Alsuhaibani, Bader Alwasel, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti, Mohammed
Publikováno v:
Applied Sciences; Volume 13; Issue 13; Pages: 7774
In the dynamic and ever-evolving realm of network security, the ability to accurately identify and classify portscan attacks both inside and outside networks is of paramount importance. This study delves into the underexplored potential of fusing gra
Autor:
Bader Alwasel
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030995836
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::49eff8d115662e724720fd8a1f65a78d
https://doi.org/10.1007/978-3-030-99584-3_14
https://doi.org/10.1007/978-3-030-99584-3_14
Autor:
Bader Alwasel
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
The problem of controllability of networks can be seen in critical infrastructure systems which are increasingly susceptible to random failures and/or malicious attacks. The ability to recover controllability quickly following an attack can be consid
Autor:
Bader Alwasel, Stephen D. Wolthusen
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783319316635
CRITIS
CRITIS
Large-scale distributed control systems such as those encountered in electric power networks or industrial control systems must be assumed to be vulnerable to attacks in which adversaries can take over control over at least part of the control networ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58733b339e37ba9cd540acfe6e372d1e
https://doi.org/10.1007/978-3-319-31664-2_30
https://doi.org/10.1007/978-3-319-31664-2_30
Autor:
Bader Alwasel, Stephen D. Wolthusen
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783319333304
CRITIS
CRITIS
Large-scale distributed control systems such as those encountered in electric power networks or industrial control systems must be assumed to be vulnerable to attacks in which adversaries can take over control at least part of the control network by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40c457875aa1451746d01b972d9450d4
https://doi.org/10.1007/978-3-319-33331-1_9
https://doi.org/10.1007/978-3-319-33331-1_9