Zobrazeno 1 - 10
of 48
pro vyhledávání: '"IZNAN H. HASBULLAH"'
Autor:
Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Al-Amiedy, Mohammad Adnan Aladaileh, Iznan H. Hasbullah
Publikováno v:
Sensors, Vol 23, Iss 9, p 4441 (2023)
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability. Despite those advantages, SDN is vulnerable to distributed denial of service (DDoS), which co
Externí odkaz:
https://doaj.org/article/dd23cf5db6b3496badfed4a0a8f3a849
Autor:
Mohammad A. Aladaileh, Mohammed Anbar, Iznan H. Hasbullah, Yung-Wey Chong, Yousef K. Sanjalawe
Publikováno v:
IEEE Access, Vol 8, Pp 143985-143995 (2020)
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane fr
Externí odkaz:
https://doaj.org/article/59af7760ba12488fa16b40527bd2043e
Autor:
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Taief Alaa Al-Amiedy, Dyala R. Ibrahim
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 775 (2023)
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. How
Externí odkaz:
https://doaj.org/article/7fc8a36806174427a6dc9c820acc16a3
Autor:
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Al-Amiedy, Iznan H. Hasbullah
Publikováno v:
Symmetry, Vol 14, Iss 12, p 2556 (2022)
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and Distributed DoS (DDoS), in order to be reliable for deployment. Sever
Externí odkaz:
https://doaj.org/article/0fe3655cd653428e94292883e2a75471
Autor:
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain, Taief Alaa Al-Amiedy
Publikováno v:
Applied Sciences, Vol 12, Iss 23, p 12441 (2022)
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional
Externí odkaz:
https://doaj.org/article/34d0904dee0e483891eee0e4b9b8ebe1
Autor:
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Shadi Al-Sarawi
Publikováno v:
Applied Sciences, Vol 12, Iss 12, p 6127 (2022)
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS attacks prevent the SDN controller from processing all incoming data ef
Externí odkaz:
https://doaj.org/article/12c955ef49c94722935a52d727e857c5
Autor:
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, Iznan H. Hasbullah
Publikováno v:
Applied Sciences, Vol 12, Iss 12, p 6150 (2022)
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IP
Externí odkaz:
https://doaj.org/article/bcc838b7d1a54bdd8530e8ec677694f1
Autor:
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Iznan H. Hasbullah, Ziyad R. Alashhab
Publikováno v:
Sensors, Vol 22, Iss 9, p 3400 (2022)
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resou
Externí odkaz:
https://doaj.org/article/2f76cd3e46094cfc9ea6e6329e2a4f2c
Publikováno v:
Sensors, Vol 22, Iss 5, p 1696 (2022)
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for
Externí odkaz:
https://doaj.org/article/70cd908341d5431caef373904faf1142
Publikováno v:
Applied Sciences, Vol 12, Iss 3, p 1383 (2022)
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (R
Externí odkaz:
https://doaj.org/article/545966d7f69443738ef6e404e89449ed