Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Muhamad Felemban"'
Publikováno v:
IEEE Access, Vol 12, Pp 157179-157191 (2024)
In digital forensics, file carving is used to extract files without relying on the underlying file system metadata. This process can be challenging if the file is fragmented. Therefore, it is important first to identify the type of file fragment. The
Externí odkaz:
https://doaj.org/article/79aee79ef8ba4f61b9403b83583fa4f1
Autor:
Sani Umar, Muhamad Felemban
Publikováno v:
Sensors, Vol 21, Iss 7, p 2478 (2021)
Cyber-security of modern power systems has captured a significant interest. The vulnerabilities in the cyber infrastructure of the power systems provide an avenue for adversaries to launch cyber attacks. An example of such cyber attacks is False Data
Externí odkaz:
https://doaj.org/article/529c1b31c18a4823ae6af5bdd3bd9724
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:4172-4186
Publikováno v:
Intelligent Automation & Soft Computing. 31:1361-1375
Autor:
Muhammad Alsaiyari, Muhamad Felemban
Publikováno v:
2023 International Conference on Smart Computing and Application (ICSCA).
Publikováno v:
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN).
Publikováno v:
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN).
Publikováno v:
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN).
Publikováno v:
2022 International Wireless Communications and Mobile Computing (IWCMC).
Publikováno v:
Computer. 53:47-56
Emerging cyberphysical systems incorporate systems of systems that have functional interdependencies. With the increase in complexity of cyberphysical systems, the attack surface also expands, making cyberphysical systems more vulnerable to cyberatta