Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Homam El-Taj"'
Artificial Intelligence (AI) has the potential to revolutionize various aspects of our lives, but it also raises significant ethical concerns. This paper examines the impact of AI on selected human rights, such as the right to privacy and freedom fro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90a9c5f6c6cd47e38940651c11394213
Autor:
Homam El-Taj
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks being reported since 2020. These cyberattacks significantly threaten the country's national security, economic stability, and personal privacy. In thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73289d4f44a92e8e0a826b83c3210cd3
Autor:
Homam El-Taj
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 11:2216-2225
Every secure system has the possibility to fail. Therefore, extra effort should be taken to protect these systems. Intrusion Detection Systems (IDSs) had been proposed with the aim of providing extra protection to security systems. These systems trig
Autor:
Homam El-Taj, Firas Najjar
Publikováno v:
International Journal of Advanced Computer Science and Applications. 6
IPv4 address pool is already exhausted; therefore, the change to use IPv6 is eventually necessary to give us a massive address pool. Although IPv6 was built with security in mind, extensive research must be done before deploying IPv6 to ensure the pr
Autor:
Ahmed Al-Madi, Homam El-Taj, Sureswaran Ramadass, Ahmed M. Manasrah, O. Abouabdalla, Muhammad Imran Sarwar
Publikováno v:
SECURWARE
Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the
Publikováno v:
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology.
Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at
Publikováno v:
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology.
E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all orga