Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Mohamed Ben Haj Frej"'
Autor:
Abdul Razaque, Fathi Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, Mohamed Ben Haj Frej
Publikováno v:
IEEE Access, Vol 8, Pp 80812-80826 (2020)
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSP
Externí odkaz:
https://doaj.org/article/18765da83a324a56a50a0c4ced0f0653
Autor:
Abdul Razaque, Mohamed Ben Haj Frej, Gulnara Bektemyssova, Fathi Amsaad, Muder Almiani, Aziz Alotaibi, N. Z. Jhanjhi, Saule Amanzholova, Majid Alshammari
Publikováno v:
Applied Sciences, Vol 13, Iss 1, p 57 (2022)
Currently, fraud detection is employed in numerous domains, including banking, finance, insurance, government organizations, law enforcement, and so on. The amount of fraud attempts has recently grown significantly, making fraud detection critical wh
Externí odkaz:
https://doaj.org/article/bb6cc6b51a5942bfb88f8a84f19e8959
Publikováno v:
Sensors, Vol 21, Iss 13, p 4431 (2021)
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavi
Externí odkaz:
https://doaj.org/article/01cf148cece8478cbed8b1343650efb1
Publikováno v:
Applied Sciences, Vol 9, Iss 15, p 3034 (2019)
Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It is found on the pay-as-you-use model. Cloud computing is changing the way information technology (IT) operates for individuals as well as for companie
Externí odkaz:
https://doaj.org/article/e2e8c59a774d488ba2228e2bf81ddf81
Autor:
Salim Hariri, Mohamed Ben Haj Frej, Fathi Amsaad, Abdul Razaque, Syed S. Rizvi, Marwah Almasri
Publikováno v:
IEEE Access, Vol 8, Pp 80812-80826 (2020)
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSP
Autor:
Abdul Razaque, Mohamed Ben Haj Frej, Gulnara Bektemyssova, Muder Almi’ani, Fathi Amsaad, Aziz Alotaibi, Noor Z. Jhanjhi, Mohsin Ali, Saule Amanzholova, Majid Alshammari
Publikováno v:
Electronics
Volume 12
Issue 5
Pages: 1129
Volume 12
Issue 5
Pages: 1129
The Quality-of-Service (QoS) provision in machine learning is affected by lesser accuracy, noise, random error, and weak generalization (ML). The Parallel Turing Integration Paradigm (PTIP) is introduced as a solution to lower accuracy and weak gener
Publikováno v:
Electronics, Vol 10, Iss 2721, p 2721 (2021)
Electronics
Volume 10
Issue 21
Electronics
Volume 10
Issue 21
Cloud computing has become a prominent technology due to its important utility service
this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individu
this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c3c52f385863aca3c038e82f09ce6062
Publikováno v:
Sensors
Volume 21
Issue 13
Sensors (Basel, Switzerland)
Sensors, Vol 21, Iss 4431, p 4431 (2021)
Volume 21
Issue 13
Sensors (Basel, Switzerland)
Sensors, Vol 21, Iss 4431, p 4431 (2021)
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavi
Autor:
Abdul Razaque, Fathi Amsaad, Mohamed Ben Haj Frej, Aidana Shaikhyn, Ahmed Oun, Dauren Sabyrov
Publikováno v:
2020 IEEE Cloud Summit.
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this p
Publikováno v:
2019 IEEE Cloud Summit.
Expected and unexpected risks in cloud computing, which included data security, data segregation, and the lack of control and knowledge, have led to some dilemmas in several fields. Among all of these dilemmas, the privacy problem is even more paramo