Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Sultan Almuhammadi"'
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 4725 (2023)
The Quick UDP Internet Connections (QUIC) protocol provides advantages over traditional TCP, but its encryption functionality reduces the visibility for operators into network traffic. Many studies deploy machine learning and deep learning algorithms
Externí odkaz:
https://doaj.org/article/020fef5ad149448390c88b77af711e11
Autor:
Lama Al-Bakhat, Sultan Almuhammadi
Publikováno v:
2022 7th International Conference on Data Science and Machine Learning Applications (CDMA).
Autor:
Sarah Alghamdi, Sultan Almuhammadi
Publikováno v:
2022 7th International Conference on Data Science and Machine Learning Applications (CDMA).
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 12:37-51
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoff
Autor:
Sultan Almuhammadi, Ibraheem Al-Hejri
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 12:71-80
Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shif
Autor:
Sarah Alghamdi, Sultan Almuhammadi
Publikováno v:
2021 IEEE International Conference on Blockchain (Blockchain).
Autor:
Sultan Almuhammadi, Sultan Alsehibani
Publikováno v:
2018 International Conference on Computing Sciences and Engineering (ICCSE).
Firewalls are the most deployed basic security devices that are used to protect private networks from unauthorized accesses and intrusions. Firewall's security protection depends mainly on the quality of the firewall's configured policies. However, a
Autor:
Ahmed M. Abouollo, Sultan Almuhammadi
Publikováno v:
2017 8th International Conference on Information and Communication Systems (ICICS).
Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time emp
Autor:
Sultan Almuhammadi, Ibraheem Al-Hejri
Publikováno v:
CCECE
With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption a
Autor:
Sultan Almuhammadi, Ahmed Al-Shaaby
Publikováno v:
Computer Science & Information Technology (CS & IT).