Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Hosny M. Ibrahim"'
Publikováno v:
Computer Communications. 196:89-108
Publikováno v:
International Journal of Computer Network and Information Security. 13:15-27
Software-Defined Networking is a new network architecture that separates control and data planes. It has central network control and programmability facilities, so it improves manageability, scaling, and performance. However, it may suffer from creat
Publikováno v:
Journal of Communications. :40-46
Publikováno v:
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS).
Internet of Things (IoT) gained a great focus in recent years due to its importance in humans' everyday life. IoT applications appear in several domains for human welfare. The need for a powerful and scalable security framework is the main focus for
Publikováno v:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017 ISBN: 9783319648606
AISI
AISI
Due to the revolution of web 2.0, the amount of opinionated data has been extremely increased, produced by online users through sharing comments, videos, pictures, reviews, news and opinions. Although Twitter is one of the most prevalent social netwo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::261a5087c296d1452ae1d615cd871dc2
https://doi.org/10.1007/978-3-319-64861-3_22
https://doi.org/10.1007/978-3-319-64861-3_22
Publikováno v:
International Journal of Computer Applications. 104:1-9
ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular M
Publikováno v:
DICTAP
For many years, dogs are used in the Search And Rescue (SAR) missions. The first recorded use of dogs in SAR missions was in the late 1700. Dogs are used in the SAR missions because their abilities to detect human scent. In many natural disasters or
Autor:
Hosny M. Ibrahim
Publikováno v:
International Journal of Ad hoc, Sensor & Ubiquitous Computing. 3:47-65
Publikováno v:
International Journal of Sensor Networks and Data Communications. 1:1-14
Publikováno v:
JES. Journal of Engineering Sciences. 38:1013-1025
Recent cybersecurity incidents suggest that internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. In this paper we present a system for detecting kn