Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Soha Alhelaly"'
Publikováno v:
Applied Sciences, Vol 12, Iss 13, p 6566 (2022)
With the emergence of various new Internet of Things (IoT) devices and the rapid increase in the number of users, enormous services and complex applications are growing rapidly. However, these services and applications are resource-intensive and data
Externí odkaz:
https://doaj.org/article/cb126e55d2a14e0d999e357db11237de
Publikováno v:
Computers, Materials & Continua. 71:4855-4870
Autor:
Soha Alhelaly
Publikováno v:
Soft Computing: Theories and Applications ISBN: 9789811998577
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d26a26741bd3af22a7c951efae15e3f
https://doi.org/10.1007/978-981-19-9858-4_39
https://doi.org/10.1007/978-981-19-9858-4_39
Autor:
Kundan Nepal, Jennifer Dworak, Alfred L. Crouch, Soha Alhelaly, Ping Gui, Theodore W. Manikas
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 9:774-786
3D integrated circuits introduce both advantages and disadvantages for security. Among the disadvantages unique to 3D is the potential insertion of a Trojan die into the stack between two legitimate dies. Such a die could be used to snoop information
Autor:
Soha Alhelaly, Wesam Shishah
Publikováno v:
Journal of Decision Systems. 30:282-299
Contactless payments are being increasingly used with people demonstrating their interest in the payment technologyby waving or tapping their cards and devices at point-of-sale (POS) terminals acro...
Publikováno v:
Computers, Materials & Continua. 69:2513-2530
Publikováno v:
International Journal of Advanced Computer Science and Applications. 13
Publikováno v:
Electronics; Volume 10; Issue 19; Pages: 2403
Electronics, Vol 10, Iss 2403, p 2403 (2021)
Electronics, Vol 10, Iss 2403, p 2403 (2021)
Network attacking using malware has become very popular on the Internet and in many other networks, namely Vehicular Ad-hoc Network (VANET) networks. It is required to have the model describing the malware spreading based on factors, which directly a
Autor:
Soha Alhelaly, Ibrahim A. Elgendy, Chaaf A, Abdullah M. Iliyasu, Ammar Muthanna, Muthanna Msa, Abd El-Latif Aa
Underwater Wireless Sensor Networks (UWSN) enables various oceanic applications which require effective packet transmission. In this case, sparse node distribution, dynamic network topology and inappropriate selection of relay nodes cause void holes.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::517dfa374270576e51f783e7b33f6ac2
Autor:
Soha Alhelaly, Amir Chaaf, Ibrahim A. Elgendy, Ammar Muthanna, Ahmed A. Abd El-Latif, Mohammed Saleh Ali Muthanna, Abdullah M. Iliyasu
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require effective packet transmission. In this case, sparse node distribution, imbalance in terms of overall energy consumption between the different sensor nodes,