Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Qussai Yaseen"'
Autor:
Ammar Almomani, Khalid Nahar, Mohammad Alauthman, Mohammed Azmi Al-Betar, Qussai Yaseen, Brij B. Gupta
Publikováno v:
International Journal of Cognitive Computing in Engineering, Vol 5, Iss , Pp 14-26 (2024)
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep learning and traditional machine lea
Externí odkaz:
https://doaj.org/article/264a4dfbd3444a1da396a8bc24702770
Publikováno v:
2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA).
Autor:
Qussai Yaseen, Isra’a AbdulNabi
Publikováno v:
ANT/EDI40
Unsolicited emails such as phishing and spam emails cost businesses and individuals millions of dollars annually. Several models and techniques to automatically detect spam emails have been introduced and developed yet non showed 100% predicative acc
Publikováno v:
ANT/EDI40
Android still has the first rank in terms of market share in comparing to other operating systems. Due to its flexible publishing policy, companies are developing many applications in order to serve user needs. The official market of Android Google P
Autor:
Nour Alqudah, Qussai Yaseen
Publikováno v:
ANT/EDI40
Traffic analysis has many purposes such as evaluating the performance and security of network operations and management. Therefore, network traffic analysis is considered vital for improving networks operation and security. This paper discusses diffe
Autor:
Yaser Jararweh, Qussai Yaseen
Publikováno v:
Journal of Network and Systems Management. 29
The Internet of Things (IoT) applications are growing immensely. However, malicious IoT devices are major concerns that threaten the security of IoT applications. This paper proposes an intelligent reputation system for IoT devices using edge computi
Autor:
Zain A. Halloush, Qussai Yaseen
Publikováno v:
DATA
The number of applications that blockchain era suggests are vastly growing each day in almost all industries. One of the most dialectical research areas using blockchain concepts is the aspects of intellectual property and copy rights. In this paper,
Autor:
Qussai Yaseen, Monther Aldwairi
Publikováno v:
FNC/MobiSPC
Black hole attack is one of the well-known attacks on Mobile Ad hoc Networks, MANET. This paper discusses this problem and proposes a new approach based on building a global reputation system that helps AODV protocol in selecting the best path to des
Publikováno v:
Cluster Computing. 20:2669-2685
The request-response paradigm that consists of policy decision points (PDPs) and policy enforcement points (PEPs) is used for access control in Cloud computing. The model uses PEP-side caching to increase the availability and reduce the processing ov
Publikováno v:
CCWC
Service and resource discovery in the Internet of Things (IoT) is reflected by the way of IoT components is connected and distributed. In other words, the IoT protocols should consider the topology construction of the IoT components. This paper explo