Zobrazeno 1 - 10
of 95
pro vyhledávání: '"Haider Al-Khateeb"'
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9528 (2024)
There has been very limited research conducted to predict rental prices in the German real estate market using an AI-based approach. From a general perspective, conventional approaches struggle to handle large amounts of data and fail to consider the
Externí odkaz:
https://doaj.org/article/f642dab4b3004e28885d1ae7e19d96f6
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 5, Iss 2, Pp 91-103 (2022)
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices wit
Externí odkaz:
https://doaj.org/article/29834efeb1e6409f8843b84eb90192d6
Autor:
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan, Haider al-Khateeb
Publikováno v:
Algorithms, Vol 16, Iss 12, p 549 (2023)
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by
Externí odkaz:
https://doaj.org/article/b03474174483478f9144fe52512515c8
Autor:
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya, Mohammed Ali
Publikováno v:
Future Internet, Vol 15, Iss 7, p 244 (2023)
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical
Externí odkaz:
https://doaj.org/article/2b64e353cf374d7f804575dfc48ccbc8
Publikováno v:
Applied Sciences, Vol 12, Iss 24, p 12941 (2022)
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a S
Externí odkaz:
https://doaj.org/article/245fd092b591405a9667e7954ac8ad36
Autor:
Carsten Maple, Mary Asante, Mirko Bottarelli, Kayhan Zrar Ghafoor, Gregory Epiphaniou, Haider Al-Khateeb
Publikováno v:
IEEE Transactions on Engineering Management. 70:713-739
Supply-chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and res
Publikováno v:
Journal of Information Security and Cybercrimes Research. 5:91-103
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices wit
Publikováno v:
IEEE Internet of Things Journal. 9:13279-13297
Industrial Control Systems (ICS) are integral parts of smart cities and critical to modern societies. Despite indisputable opportunities introduced by disruptor technologies, they proliferate the cybersecurity threat landscape, which is increasingly
Autor:
Nikolaos Ersotelos, Mirko Bottarelli, Haider Al-Khateeb, Gregory Epiphaniou, Zhraa Alhaboby, Prashant Pillai, Amar Aggoun
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 10, Iss 1, p 1 (2020)
By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In the UK, a report by the Office for Education (OfE) showed 17% of young people had been bullied during 2017–2018. T
Externí odkaz:
https://doaj.org/article/44fefdb34dc84a18b99453cc1d91dcf8
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:700-715
Advanced cyber attackers often “pivot” through several devices in such complex infrastructure to obfuscate their footprints and overcome connectivity restrictions. However, prior pivot attack detection strategies present concerning limitations. T