Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Saad Said Alqahtany"'
Publikováno v:
Computers, Vol 13, Iss 7, p 164 (2024)
Remote healthcare monitoring (RHM) has become a pivotal component of modern healthcare, offering a crucial lifeline to numerous patients. Ensuring the integrity and privacy of the data generated and transmitted by IoT devices is of paramount importan
Externí odkaz:
https://doaj.org/article/2b467344aaea4a1397b75589a08798fb
Autor:
Saad Said Alqahtany, Toqeer Ali Syed
Publikováno v:
Applied Sciences, Vol 14, Iss 11, p 4421 (2024)
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an i
Externí odkaz:
https://doaj.org/article/355fc16dc0154047b1572f9286703cbd
Autor:
Basil Saud Alhazmi, Oussama Benrhouma, Adnan Nadeem AlHassan, Muhammad Ashraf, Saad Said Alqahtany
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101845- (2023)
Secure data transmission is critical in public video surveillance applications such as tracking missing persons in large crowd gatherings. It may help the security personnel to monitor & record the live feeds from multiple cameras. However, this live
Externí odkaz:
https://doaj.org/article/218017d2f0ee4151970e91184a1eabb8
Autor:
Saad Said Alqahtany, Toqeer Ali Syed
Publikováno v:
Information, Vol 15, Iss 2, p 109 (2024)
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice.
Externí odkaz:
https://doaj.org/article/1764e33900fc49d39c9a7c960dfc8a29
Autor:
Mohammad Hijjawi, Mohammad Alshinwan, Osama Ahmed Khashan, Waleed Alomoush, Nader Abdel Karim, Ahmed Younes Shdefat, Saad Said Alqahtany, Eman Shudayfat
Publikováno v:
IEEE Access, Vol 11, Pp 145146-145166 (2023)
Enhancing the performance of wireless networks and communication systems requires careful resource allocation. Resource allocation optimization, however, is regarded as a mixed-integer non-linear programming (MINLP) problem, which is NP-hard and non-
Externí odkaz:
https://doaj.org/article/f3e59e90082548f4aa832e2304546e88
Publikováno v:
Applied Sciences, Vol 13, Iss 12, p 7294 (2023)
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhe
Externí odkaz:
https://doaj.org/article/874cd9e9b20d453f8c2ccb8789350660
Publikováno v:
Applied Sciences, Vol 13, Iss 3, p 1851 (2023)
IoT technology and drones are indeed a step towards modernization. Everything from field monitoring to pest identification is being conducted through these technologies. In this paper, we consider the issue of smart pest detection and management of c
Externí odkaz:
https://doaj.org/article/aa7db86897ed44499a78fa0f5281fda3
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 1028 (2023)
Blockchains are gaining traction as secure and reliable platforms for data sharing in fields such as banking, supply chain management, food production, energy, the Internet, and medical services. Furthermore, when decentralized, a blockchain can be r
Externí odkaz:
https://doaj.org/article/ab71642535db43dc8720de16a67b6b77
Publikováno v:
Applied Sciences; Volume 13; Issue 12; Pages: 7294
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhe