Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Fahd Alhaidari"'
Autor:
Malak Aljabri, Fahd Alhaidari, Aminah Albuainain, Samiyah Alrashidi, Jana Alansari, Wasmiyah Alqahtani, Jana Alshaya
Publikováno v:
Egyptian Informatics Journal, Vol 25, Iss , Pp 100445- (2024)
Ransomware attacks have escalated recently and are affecting essential infrastructure and enterprises across the globe. Unfortunately, ransomware uses sophisticated encryption techniques to encrypt important files on the targeted machine and then dem
Externí odkaz:
https://doaj.org/article/ac05c5d889484c61a82105816834952f
Autor:
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah Al-Harbi, Haya T. Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A. Mohammad, Khaled Salah
Publikováno v:
IEEE Access, Vol 10, Pp 121395-121417 (2022)
In recent years, the digital world has advanced significantly, particularly on the Internet, which is critical given that many of our activities are now conducted online. As a result of attackers’ inventive techniques, the risk of a cyberattack is
Externí odkaz:
https://doaj.org/article/4f87136e7a57420fb01153f6044fe3cf
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 12, Iss 2, p 29 (2023)
With the continuous increase in Internet of Things (IoT) device usage, more interest has been shown in internet security, specifically focusing on protecting these vulnerable devices from malicious traffic. Such threats are difficult to distinguish,
Externí odkaz:
https://doaj.org/article/6c9ebd296265472b8804d4a1a0d65587
Autor:
Malak Aljabri, Amal A. Alahmadi, Rami Mustafa A. Mohammad, Fahd Alhaidari, Menna Aboulnour, Dorieh M. Alomari, Samiha Mirza
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 12, Iss 2, p 27 (2023)
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring and processing sensitive data. Attackers have exploited this prospect of IoT devices to compromise us
Externí odkaz:
https://doaj.org/article/27a9d7d46dda42e9a11de2e332225770
Publikováno v:
Computers, Vol 10, Iss 5, p 63 (2021)
Recently, there has been significant growth in the popularity of cloud computing systems. One of the main issues in building cloud computing systems is task scheduling. It plays a critical role in achieving high-level performance and outstanding thro
Externí odkaz:
https://doaj.org/article/92c51f4983b840ab91299509da3a046b
Autor:
Fahd Alhaidari, Abdullah Almuhaideb, Shikah Alsunaidi, Nehad Ibrahim, Nida Aslam, Irfan Ullah Khan, Fatema Shaikh, Mohammed Alshahrani, Hajar Alharthi, Yasmine Alsenbel, Dima Alalharith
Publikováno v:
Sensors, Vol 21, Iss 8, p 2845 (2021)
With population growth and aging, the emergence of new diseases and immunodeficiency, the demand for emergency departments (EDs) increases, making overcrowding in these departments a global problem. Due to the disease severity and transmission rate o
Externí odkaz:
https://doaj.org/article/b80e2363655946d6be126d14fe8b7e52
Autor:
Fahd Alhaidari, Nouran Abu Shaib, Maram Alsafi, Haneen Alharbi, Majd Alawami, Reem Aljindan, Atta-ur Rahman, Rachid Zagrouba
Publikováno v:
Computational Intelligence and Neuroscience. 2022:1-15
For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrou
Autor:
Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Linah Saraireh, Hisham Kholidy, Mohammed Gollapalli, Dhiaa Musleh, Fahd Alhaidari, Dakheel Almoqbil, Mohammed Imran Basheer Ahmed
Publikováno v:
Mathematical Modelling of Engineering Problems. 9:397-404
On the telecommunications front, 5G is the fifth-generation technology standard for broadband cellular networks, which is a replacement for the 4G networks used by most current phones. Hundreds of businesses, organizations, and governments suffer fro
Autor:
Malak Aljabri, Fahd Alhaidari, Rami Mustafa A. Mohammad, null Samiha Mirza, Dina H. Alhamed, Hanan S. Altamimi, Sara Mhd. Bachar Chrouf
Publikováno v:
Computational intelligence and neuroscience. 2022
The World Wide Web services are essential in our daily lives and are available to communities through Uniform Resource Locator (URL). Attackers utilize such means of communication and create malicious URLs to conduct fraudulent activities and deceive
Autor:
Norah Saad Al-Serhani, Abdullah M. Almuhaideb, Fahd Alhaidari, Kholood AlAjaji, Atta-ur-Rahman, Rachid Zagrouba, Asayel AlAbdullatif
Publikováno v:
Computers, Materials & Continua. 67:1103-1119