Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Imed Romdhani"'
Publikováno v:
Mathematics, Vol 10, Iss 17, p 3148 (2022)
In recent years, educational institutions have worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most of the decisions in educational institutions rely on rating the ac
Externí odkaz:
https://doaj.org/article/93ec661a2fe64fe3b1032d337a2f22b6
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 420, Iss 19, Pp 203-211 (2016)
Wireless Body Area Network (WBAN) has been a potential avenue for future digitized healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consumption, the vulnerability and
Externí odkaz:
https://doaj.org/article/27ba892df5854473ae3c4e50a00f5da7
Publikováno v:
Applied Sciences, Vol 10, Iss 7, p 2527 (2020)
Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators.
Externí odkaz:
https://doaj.org/article/3177fea44f564286ac37752144421bba
Publikováno v:
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence ISBN: 9781003373384
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::23ac9a1d7fb032bf6c69b042172820b0
https://doi.org/10.1201/9781003373384-1
https://doi.org/10.1201/9781003373384-1
Publikováno v:
Computing. 103:291-311
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While
Autor:
Mamoun Qasem, Imed Romdhani, Lewis M. Mackenzie, Baraq Ghaleb, Ahmed Al-Dubai, Elias Ekonomou
Publikováno v:
IEEE Communications Letters. 23:68-71
In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the resea
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6ad393c38d693132db329ba57dbbe4f0