Zobrazeno 1 - 10
of 128
pro vyhledávání: '"Jalal Al-Muhtadi"'
Publikováno v:
IEEE Access, Vol 11, Pp 142360-142370 (2023)
A human adult’s skeleton is made up of 206 bones that perform a variety of vital biological tasks like safeguarding the internal organs and preserving vital nutrients. Bone fractures in adult’s particularly in athletes can lead to minor sports in
Externí odkaz:
https://doaj.org/article/5c987847f9e147b9a8cab4cdc4e2185d
Autor:
Noureddine Seddari, Abdelouahid Derhab, Mohamed Belaoued, Waleed Halboob, Jalal Al-Muhtadi, Abdelghani Bouras
Publikováno v:
IEEE Access, Vol 10, Pp 62097-62109 (2022)
The rapid development of different social media and content-sharing platforms has been largely exploited to spread misinformation and fake news that make people believing in harmful stories, which allow to influence public opinion, and could cause pa
Externí odkaz:
https://doaj.org/article/1dbc50e8fade425c9ceda03cbea98176
Publikováno v:
IEEE Access, Vol 10, Pp 88263-88275 (2022)
The Distributed Denial of Service (DDoS) attack is considered one of the most critical threats on the Internet, blocking legitimate users from accessing online services. Botnets have exploited insecure IoT devices and used them to launch DDoS attacks
Externí odkaz:
https://doaj.org/article/9ed7bdbf5a7f443393020f55e0f8bdb7
Autor:
Abdelouahid Derhab, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan, Jalal Al-Muhtadi
Publikováno v:
IEEE Access, Vol 9, Pp 65988-66005 (2021)
Twitter is one of the most popular micro-blogging social media platforms that has millions of users. Due to its popularity, Twitter has been targeted by different attacks such as spreading rumors, phishing links, and malware. Tweet-based botnets repr
Externí odkaz:
https://doaj.org/article/b63a9959710b42589ca0aafbec1751a5
Ensemble-Learning-Based Decision Support System for Energy-Theft Detection in Smart-Grid Environment
Publikováno v:
Energies, Vol 16, Iss 4, p 1907 (2023)
Theft of electricity poses a significant risk to the public and is the most costly non-technical loss for an electrical supplier. In addition to affecting the quality of the energy supply and the strain on the power grid, fraudulent electricity use d
Externí odkaz:
https://doaj.org/article/7ed00283b8c24d238e5bc07151531995
Autor:
Kashif Saleem, Ghadah Majid Alabduljabbar, Nouf Alrowais, Jalal Al-Muhtadi, Muhammad Imran, Joel J. P. C. Rodrigues
Publikováno v:
IEEE Access, Vol 8, Pp 229152-229160 (2020)
Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by ma
Externí odkaz:
https://doaj.org/article/6a77174dd7d64ccc89407e4703361b1f
Autor:
Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, Maruf Pasha
Publikováno v:
IEEE Access, Vol 6, Pp 16363-16376 (2018)
Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility
Externí odkaz:
https://doaj.org/article/b7b18a682ba44fc4b28e9fa9d4bd1ba2
Autor:
Joel J. P. C. Rodrigues, Dante Borges De Rezende Segundo, Heres Arantes Junqueira, Murilo Henrique Sabino, Rafael Maciel Prince, Jalal Al-Muhtadi, Victor Hugo C. De Albuquerque
Publikováno v:
IEEE Access, Vol 6, Pp 13129-13141 (2018)
The Internet of Things (IoT) is one of the most promising technologies for the near future. Healthcare and well-being will receive great benefits with the evolution of this technology. This paper presents a review of techniques based on IoT for healt
Externí odkaz:
https://doaj.org/article/262f078fa99d44caa9215589cc430075
Autor:
Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli
Publikováno v:
IEEE Access, Vol 6, Pp 19140-19150 (2018)
The task of protecting healthcare information systems (HIS) from immediate cyber security risks has been intertwined with cloud computing adoption. The data and resources of HISs are inherently shared with other systems for remote access, decision ma
Externí odkaz:
https://doaj.org/article/3edcd5e4a9c8433e8972e3631baecd1c
Publikováno v:
IEEE Access, Vol 5, Pp 13501-13519 (2017)
The detection of anomalies in network traffic, such as low volume attacks and abnormalities, has become a pressing problem in today's large volume of Internet traffic. To this end, various anomaly detection techniques have been developed, including t
Externí odkaz:
https://doaj.org/article/ddae40614d1f4c0a820e0e1efad6be13