Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Muath Obaidat"'
Autor:
Syeda Nazia Ashraf, Selvakumar Manickam, Syed Saood Zia, Abdul Ahad Abro, Muath Obaidat, Mueen Uddin, Maha Abdelhaq, Raed Alsaqour
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-20 (2023)
Abstract The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement le
Externí odkaz:
https://doaj.org/article/a7911da83b11446aa08846af93634aac
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges
Publikováno v:
IEEE Access, Vol 11, Pp 87087-87103 (2023)
The metaverse, an emergent interconnected network that harmoniously merges digital and physical realities, represents a revolutionary paradigm in the computing realm, engendering a nexus of immersive, interactive experiences through user avatars. Thi
Externí odkaz:
https://doaj.org/article/6d4d1ae09d8546da934429c11d2cd83c
Publikováno v:
IEEE Access, Vol 11, Pp 69686-69707 (2023)
In recent times, the emergence of the Metaverse has garnered worldwide attention as an innovative digital space that holds immense potential to provide a wide range of health services to medical professionals and patients. With increasing stress on h
Externí odkaz:
https://doaj.org/article/72f4d53acddc4277b320136fdc37ab41
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 18, Iss 6, Pp 66-74 (2020)
Browser fingerprinting refers to a collection of techniques used to gather information about a user's browser attributes. The information gained from a browser fingerprint can be used to partially or fully identify a user without using any other tech
Externí odkaz:
https://doaj.org/article/f74ca67ce41941118061ea3fbe198281
Publikováno v:
Sensors, Vol 20, Iss 15, p 4212 (2020)
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architect
Externí odkaz:
https://doaj.org/article/fc29b553c60947fba1882317f8539eef
Publikováno v:
2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC).
Publikováno v:
2021 IEEE World AI IoT Congress (AIIoT).
Adaptive honeypots are being widely proposed as a more powerful alternative to the traditional honeypot model. Just as with typical honeypots, however, one of the most important concerns of an adaptive honeypot is environment deception in order to ma
Autor:
Joseph Brown, Muath Obaidat
In recent years, blockchain has emerged as a popular data structure for use in software solutions. However, its meteoric rise has not been without criticism. Blockchain has been the subject of intense discussion in the field of cybersecurity because
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c26ca79c4025dd209b713594f446d38
https://doi.org/10.4018/978-1-7998-6650-3.ch006
https://doi.org/10.4018/978-1-7998-6650-3.ch006
Autor:
Muath Obaidat, Joseph Brown
Publikováno v:
ISNCC
Current paradigms for client-server authentication often rely on username/password schemes. Studies show such schemes are increasingly vulnerable to heuristic and brute-force attacks. This is either due to poor practices by users such as insecure wea
Publikováno v:
DASC/PiCom/CBDCom/CyberSciTech
Browser extensions have by and large become a normal and accepted omnipresent feature within modern browsers. However, since their inception, browser extensions have remained under scrutiny for opening vulnerabilities for users. While a large amount