Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Orieb AbuAlghanam"'
Publikováno v:
Computers, Vol 11, Iss 12, p 173 (2022)
Recently, the proliferation of smartphones, tablets, and smartwatches has raised security concerns from researchers. Android-based mobile devices are considered a dominant operating system. The open-source nature of this platform makes it a good targ
Externí odkaz:
https://doaj.org/article/de4ee9b35cf44a22a864c0c3becd5334
Publikováno v:
Cybernetics and Information Technologies. 22:73-90
A critical task and a competitive research area is to secure networks against attacks. One of the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning has been recently used by researchers to develop high performance
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 14:131-145
Publikováno v:
Cybernetics and Information Technologies. 22:146-160
The Internet of Things (IoT) is widespread in our lives these days (e.g., Smart homes, smart cities, etc.). Despite its significant role in providing automatic real-time services to users, these devices are highly vulnerable due to their design simpl
Publikováno v:
Cybernetics and Information Technologies. 22:36-49
Learning Vector Quantization (LVQ) is one of the most widely used classification approaches. LVQ faces a problem as when the size of data grows large it becomes slower. In this paper, a modified version of LVQ, which is called PDLVQ is proposed to ac
Autor:
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh, Mohammed Amin Almaiah
Publikováno v:
Electronics; Volume 12; Issue 6; Pages: 1467
The domain name system (DNS) plays a vital role in network services for name resolution. By default, this service is seldom blocked by security solutions. Thus, it has been exploited for security breaches using the DNS covert channel (tunnel). One of
Autor:
Orieb AbuAlghanam, Hadeel Alazzam, Mohammad Qatawneh, Omar Aladwan, Mohammad A. Alsharaiah, Mohammed Amin Almaiah
The rapid advancement of smartphones, as well as their widespread use, has resulted in a significant increase in new security concerns. Malware’s covert techniques make signature-based anti-virus/anti-malware solutions difficult to detect. The feat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ccc2ee593469f7e456b9746a9271010c
https://doi.org/10.21203/rs.3.rs-2521341/v1
https://doi.org/10.21203/rs.3.rs-2521341/v1
Publikováno v:
The Journal of Supercomputing. 78:5075-5094
Pathfinding problem has several applications in our life and widely used in virtual environments. It has different goals such as shortest path, secure path, or optimal path. Pathfinding problem deals with a large amount of data since it considers eve
Publikováno v:
2022 13th International Conference on Information and Communication Systems (ICICS).
Publikováno v:
International Journal of Computer Applications. 175:13-20