Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Malik Qasaimeh"'
Autor:
Raad Al-Qassas, Malik Qasaimeh
Publikováno v:
PeerJ Computer Science, Vol 10, p e2259 (2024)
Routing in vehicular ad hoc networks (VANETs) enables vehicles to communicate for safety and non-safety applications. However, there are limitations in wireless communication that can degrade VANET performance, so it is crucial to optimize the operat
Externí odkaz:
https://doaj.org/article/8f819323fd9a466390bab1b1fccf1b58
Publikováno v:
Future Internet, Vol 13, Iss 11, p 273 (2021)
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications.
Externí odkaz:
https://doaj.org/article/48fb057f18884439b08ba8d397dfa495
Autor:
Ammar Abdallah, Alain ABRAN, Malik Qasaimeh, Alaeddin Mohammad Khalaf Ahmad, Abdullah Al-Refai
Publikováno v:
Interdisciplinary Journal of Information, Knowledge, and Management. 18:321-352
Aim/Purpose: This study identifies the scale types and measurement units used in the measurement of enterprise architecture (EA) and analyzes the admissibility of the mathematical operations used. Background: The majority of measurement solutions pro
Autor:
Raad S. Al-Qassas, Malik Qasaimeh
Publikováno v:
Cybernetics and Information Technologies. 22:77-94
Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 algorit
Publikováno v:
Information Security Journal: A Global Perspective. 32:252-265
SQL injection is a type of database-targeted attack for data-driven applications. It is performed by inserting malicious code in the SQL query to alter and modify its meaning, enabling the attacker...
Publikováno v:
Recent Advances in Computer Science and Communications. 14:1381-1389
Introduction: Intrusion detection systems play a key role in system security by identifying potential attacks and giving appropriate responses. As new attacks are always emerging, intrusion detection systems must adapt to these attacks, and more work
Publikováno v:
Recent Advances in Computer Science and Communications. 14:1370-1380
Background: E-mail is an efficient way to communicate. It is one of the most commonly used communication methods, and it can be used for achieving legitimate and illegitimate activities. Many features that can be effective in detecting email fraud at
Autor:
Malik Qasaimeh, Rand Abu Hammour, Muneer Bani Yassein, Raad S. Al‐Qassas, Juan Alfonso Lara Torralbo, David Lizcano
Publikováno v:
Journal of Software: Evolution and Process. 34
Publikováno v:
2022 International Conference on Engineering & MIS (ICEMIS).
Publikováno v:
The 7th International Conference on Engineering & MIS 2021.