Zobrazeno 1 - 10
of 56
pro vyhledávání: '"EL Hajji, Said"'
Publikováno v:
In Computers & Security September 2023 132
Publikováno v:
MATEC Web of Conferences, Vol 189, p 10015 (2018)
The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtual
Externí odkaz:
https://doaj.org/article/1a7465c37fbc4c5a94c4001e3280c8cc
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Software Engineering and Its Applications. 10:95-108
In recent years, the security in Wireless sensor networks becomes a good topic for researchers; it is a challenge task due to inheritance limitations of sensors. Besides, security becomes extremely crucial factor when sensor networks are randomly dep
Publikováno v:
2017 International Conference on Engineering and Technology (ICET).
The sensor networks application domain continues to increase with the need for an effective security mechanism. Routing receives the most attention since they are among the daily network routines. Due the insecure nature of wireless communication cha
Autor:
El Hajji Said, Ennahbaoui Mohammed
Publikováno v:
International Journal of Security and Its Applications. 8:407-424
One of the most important components in information systems security is the Access Control policy. In order to ensure the best Access Control policy, it is mandatory to proceed to a modeling phase that respects a set of indications and criteria of a
Publikováno v:
2016 International Conference on Engineering & MIS (ICEMIS).
Sensor technologies are vital today in gathering information about certain environments and Wireless Sensors Networks (WSNs) are getting more widespread use every day. The recent advances in Wireless Sensor Networks open new scenarios where sensors c
Publikováno v:
2016 International Conference on Engineering & MIS (ICEMIS).
Recently, Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. Therefore, security in WSNs is a challenging task due to inheritance limitations of sensors and it becomes a good topic for re