Zobrazeno 1 - 10
of 104
pro vyhledávání: '"H. Sqalli"'
Autor:
M.A. Mokfi, S. Koualla, D. Jaadi, Z. Badaoui, H. Sqalli, R. Lamtaouech, A. Khales, A. Achbouk, K. Ababou
Publikováno v:
Annales de Chirurgie Plastique Esthétique.
Publikováno v:
SAS Journal of Surgery. 7:590-595
Beautifully shaped, “perky” breast is a symbol of youth and sexuality, and the lack of this trait can cause insecurity and self-esteem issues for many women. In this manuscript, we will describe the most frequently techniques used to manage breas
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Arabian Journal for Science and Engineering. 42:833-844
Denial of service (DoS) attack is purely malicious and commonly used to overwhelm a network system making network resources unavailable to legitimate users. One such DoS attack is to target the firewall system of the enterprise, whereby the attacker
Publikováno v:
Arabian Journal for Science and Engineering. 42:793-804
Cloud adoption by industry and governments has been on the rise for the past few years due to the obvious cloud technology advantages that include scalability, reliability, availability, agility, and cost efficiency. However, cloud security remains a
Publikováno v:
Arabian Journal for Science and Engineering. 41:5037-5047
Security of cloud services is of utmost importance for contemporary cloud providers. In addition to the traditional malicious attacks that have targeted cloud datacenters in the past, new and persistent threats have changed the landscape of cyber-att
Publikováno v:
Arabian Journal for Science and Engineering. 40:773-785
Cloud computing is currently one of the fastest growing segments of IT. To date, and according to a recent survey conducted by the International Data Corporation, security is the biggest challenge to cloud computing. A cloud introduces resource-rich
Publikováno v:
Phytothérapie. 11:365-372
Cistus albidus et Cistus salvifolius, deux especes de la famille des Cistacees, sont repandues dans le bassin mediterraneen et sont dotees de proprietes therapeutiques. Dans ce travail, l’activite antimycobacterienne de ces deux especes est evaluee
Publikováno v:
Security and Communication Networks. 6:567-583
A Honeynet is a network designed by the Honeynet Project organization to gather information on security threats and attacks. Honeynets are being used by numerous institutions to proactively improve network security by identifying malicious and unauth
Autor:
Mohammed H. Sqalli, Abdulaziz Al-Baiz, Farag Azzedin, Ashraf S. Hasan Mahmoud, Marwan H. Abu-Amara
Publikováno v:
Security and Communication Networks. 6:194-209
The Internet is an interconnection of autonomous systems (ASes) that are mostly controlled by Internet service providers (ISPs). ASes use Border Gateway Protocol (BGP) to communicate routing information in the form of reachability paths. However, BGP