Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Sahar Aldhaheri"'
Autor:
Sahar Aldhaheri, Abeer Alhuzali
Publikováno v:
Sensors, Vol 23, Iss 18, p 7796 (2023)
In cybersecurity, a network intrusion detection system (NIDS) is a critical component in networks. It monitors network traffic and flags suspicious activities. To effectively detect malicious traffic, several detection techniques, including machine l
Externí odkaz:
https://doaj.org/article/1c4fbab33e824e06a320521fe04d029c
Publikováno v:
Applied Sciences, Vol 10, Iss 6, p 1909 (2020)
Recently Internet of Things (IoT) attains tremendous popularity, although this promising technology leads to a variety of security obstacles. The conventional solutions do not suit the new dilemmas brought by the IoT ecosystem. Conversely, Artificial
Externí odkaz:
https://doaj.org/article/bd6a582d4fcb46d0ac6b2b6d846282aa
Publikováno v:
Computer Systems Science and Engineering. 46:3667-3684
Autor:
Sahar Aldhaheri, Reem Alotaibi, Bandar Alzahrani, Anas Hadi, Arif Mahmood, Areej Alhothali, Ahmed Barnawi
Publikováno v:
Applied Intelligence. 53:9285-9297
Publikováno v:
2023 IEEE International Conference on Consumer Electronics (ICCE).
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 16:6968-6976
Responding to disasters and crises is a crucial role for the government to ensure the public safety of society. Responding lies in the counter of crimes of civil or disorders, providing the urgent medical care to injured or sick people, and providing
Publikováno v:
Journal of Network and Computer Applications. 157:102537
As the Internet of Things (IoT) recently attains tremendous popularity, this promising technology leads to a variety of security challenges. The traditional solutions do not fit the new challenges brought by the IoT ecosystem. Although the developmen
Publikováno v:
Applied Sciences
Volume 10
Issue 6
Applied Sciences, Vol 10, Iss 6, p 1909 (2020)
Volume 10
Issue 6
Applied Sciences, Vol 10, Iss 6, p 1909 (2020)
Recently Internet of Things (IoT) attains tremendous popularity, although this promising technology leads to a variety of security obstacles. The conventional solutions do not suit the new dilemmas brought by the IoT ecosystem. Conversely, Artificial