Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Mustafa Al-Fayoumi"'
Autor:
Mustafa Al-Fayoumi, Qasem Abu Al-Haija
Publikováno v:
Array, Vol 19, Iss , Pp 100316- (2023)
The MQTT (Message Queue Telemetry Transport) protocol has recently been standardized to provide a lightweight open messaging service over low-bandwidth and resource-constrained communication environments. Hence, it is the primary messaging protocol u
Externí odkaz:
https://doaj.org/article/e83f2e816e184e059277991bb1399816
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 2, Pp 173-185 (2022)
Security issues are the most critical challenges facing new technologies associated with the internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion detection system (IDS) is crucial to detect security threats. Exist
Externí odkaz:
https://doaj.org/article/676b8ec4f8044c98bca4e4e0aaa27d0c
Autor:
Qasem Abu Al-Haija, Mustafa Al-Fayoumi
Publikováno v:
Neural Computing and Applications.
Publikováno v:
Computers, Materials & Continua. 72:3091-3111
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Recent Advances in Computer Science and Communications. 14:1381-1389
Introduction: Intrusion detection systems play a key role in system security by identifying potential attacks and giving appropriate responses. As new attacks are always emerging, intrusion detection systems must adapt to these attacks, and more work
Publikováno v:
Recent Advances in Computer Science and Communications. 14:1370-1380
Background: E-mail is an efficient way to communicate. It is one of the most commonly used communication methods, and it can be used for achieving legitimate and illegitimate activities. Many features that can be effective in detecting email fraud at
Autor:
Mustafa Al-Fayoumi, Nashwan, S.
Publikováno v:
Scopus-Elsevier
The operations cost of authentication session is considered as strict indicator to evaluate the authentication protocols side by side with the security requirements achievements in the Near Field Communication (NFC) technology. The secure authenticat
Publikováno v:
International Journal of Computer Applications. 175:30-36
Publikováno v:
The International Arab Journal of Information Technology. 17:488-496
Many critical applications need more accuracy and speed in the decision making process. Data mining scholars developed set of artificial automated tools to enhance the entire decisions based on type of application. Phishing is one of the most critica