Zobrazeno 1 - 10
of 243
pro vyhledávání: '"I. Al-Saleh"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Forensic science review. 35(1)
The COVID-19 pandemic has affected millions of people around the world either directly or indirectly. Deaths have been attributed to COVID-19 as the underlying cause of death or as a contributing cause of death. It is estimated that millions of exces
Autor:
Khaled A Amer, Abdulrahman A Aldosari, Mansour Y Somaily, Rammas A Shawkhan, Razan A Almuhsini, Mohammed A Al Mater, Aseel I Al Saleh, Maram S Alshabeeb, Fahad S Alshahrani
Publikováno v:
Cureus.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Future Generation Computer Systems. 108:1217-1229
Increasingly, Cyber–physical Systems are expected to operate in different environments and interconnect with a diverse set of systems, equipment, and networks. This openness to heterogeneity, diversity, and complexity introduces a new level of vuln
Autor:
Ethar Qawasmeh, Mohammed I. Al-Saleh
Publikováno v:
2020 Seventh International Conference on Information Technology Trends (ITT).
Cybercrimes have risen dramatically recently as a result of the widespread usage of the various digital devices. Digital forensic science has been founded to address cybercrimes aspects. It follows a standard procedure to extract digital evidence and
Publikováno v:
2020 11th International Conference on Information and Communication Systems (ICICS).
Mobile devices have become an essential part of our life. These devices are a platform for social media and chat apps that are often designed to assist us retain our connection with old and new online friends. However, regardless of their valuable so
Publikováno v:
Far East Journal of Electronics and Communications. 18:695-722
Publikováno v:
Journal of Computer Science. 13:290-300
The Antivirus (AV) products are utilized by home user's community to attain protection. To some extent, the AV meets users' expectations by detecting previously known malware samples. In this study, we question the set of events which should trigger
Autor:
Iyad Abu Doush, Mohammed I. Al-Saleh
Publikováno v:
Journal of Experimental & Theoretical Artificial Intelligence. 29:1297-1310
Different attack and defence techniques have been evolved over time as actions and reactions between black-hat and white-hat communities. Encryption, polymorphism, metamorphism and obfuscation are ...