Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Raad S. Al-Qassas"'
Publikováno v:
Future Internet, Vol 13, Iss 11, p 273 (2021)
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications.
Externí odkaz:
https://doaj.org/article/48fb057f18884439b08ba8d397dfa495
Autor:
Raad S. Al-Qassas, Malik Qasaimeh
Publikováno v:
Cybernetics and Information Technologies. 22:77-94
Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 algorit
Publikováno v:
Information Security Journal: A Global Perspective. 32:252-265
SQL injection is a type of database-targeted attack for data-driven applications. It is performed by inserting malicious code in the SQL query to alter and modify its meaning, enabling the attacker...
Publikováno v:
Recent Advances in Computer Science and Communications. 14:1370-1380
Background: E-mail is an efficient way to communicate. It is one of the most commonly used communication methods, and it can be used for achieving legitimate and illegitimate activities. Many features that can be effective in detecting email fraud at
Autor:
Malik Qasaimeh, Rand Abu Hammour, Muneer Bani Yassein, Raad S. Al‐Qassas, Juan Alfonso Lara Torralbo, David Lizcano
Publikováno v:
Journal of Software: Evolution and Process. 34
Publikováno v:
2022 International Conference on Engineering & MIS (ICEMIS).
Autor:
Raad S. Al-Qassas
Publikováno v:
Recent Advances in Computer Science and Communications. 14
The majority of routing algorithms proposed for IoT can be categorized under modifications in routing protocols designated for IoT such as RPL objective functions enhancements, while others are enhancements in routing algorithms derived from those wh
Publikováno v:
Future Internet, Vol 13, Iss 273, p 273 (2021)
Future Internet
Volume 13
Issue 11
Future Internet
Volume 13
Issue 11
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications.
Publikováno v:
Cybernetics and Information Technologies. 19:27-52
Smart Grid (SG) is a major electricity trend expected to replace traditional electricity systems. SG has faster response to electricity malfunctions and improved utilization of consumed power, and it has two-way communication between providers and co
Publikováno v:
DATA
Social Engineering Attack has recently become a real threat affecting organizations, and 53.9% of such attacks target the banking sector. Successful attacks violate privacy by breaching sensitive data, and can cause huge financial loss for organizati