Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Mohamed, Guerroumi"'
Publikováno v:
Wireless Networks (10220038); Aug2024, Vol. 30 Issue 6, p5867-5886, 20p
Publikováno v:
IEEE Access, Vol 8, Pp 28956-28969 (2020)
Security analysts have shown that it is possible to compromise the mobile two-factor authentication applications that employ SMS-based authentication. In this paper, we consider that offloading mobile applications to the cloud, which is resource-rich
Externí odkaz:
https://doaj.org/article/c564cfc75ff54879a819ec8b01635e50
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ali Khalfi, Mohamed Guerroumi
Publikováno v:
2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS).
Autor:
Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan
Publikováno v:
Sensors, Vol 19, Iss 14, p 3119 (2019)
The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be
Externí odkaz:
https://doaj.org/article/111d97cd3f4348e0864e48f3aa8a2b10
Publikováno v:
Wireless Communications and Mobile Computing
Wireless Communications and Mobile Computing, Hindawi Publishing Corporation, 2021, 2021, pp.1-12. ⟨10.1155/2021/9984666⟩
Wireless Communications and Mobile Computing, Vol 2021 (2021)
Wireless Communications and Mobile Computing, Hindawi Publishing Corporation, 2021, 2021, pp.1-12. ⟨10.1155/2021/9984666⟩
Wireless Communications and Mobile Computing, Vol 2021 (2021)
International audience; Multicontroller software-defined networks have been widely adopted to enable management of large-scale networks. However, they are vulnerable to several attacks including false data injection, which creates topology inconsiste
Publikováno v:
Neural Computing and Applications. 32:3475-3501
Intrusion detection systems are one of the security tools widely deployed in network architectures in order to monitor, detect and eventually respond to any suspicious activity in the network. However, the constantly growing complexity of networks an
Publikováno v:
ISNCC
Smart city is an important application of Internet of Things (IoT). To meet the requirements of smart city, efficient mechanisms are needed to deliver data from IoT sensors to data centers for processing. Vehicular networks based data collection appr
Publikováno v:
Telecommunication Systems. 70:81-96
In a wireless sensor network (WSN) where positioning information is not assumed or is partially available, efficient data access is a very challenging issue especially in an environment with multiple random sources and sinks. Few years back, an inter
Publikováno v:
2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS).
In Vehicular Sensor Networks (VSNs), road safety applications are important to ensure the safety of motorists by broadcasting alert messages in this network. The dissemination process is the use of adaptive broadcasting algorithms that make efficient