Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Tarek S. Sobh"'
Autor:
Awad H. Khalil, Tarek S. Sobh
Publikováno v:
Recent Advances in Computer Science and Communications. 16
Aims: This research aims to secure and support mobile devices and IoTs enabled in WLAN and 5G Multi-Access Edge Computing (MEC) infrastructures. Background: Currently, wireless network access gains increasing potential in today's networks. At the sam
Autor:
Tarek S. Sobh
Publikováno v:
Journal of Applied Security Research. 15:517-546
This paper aims to secure money transactions due to money laundering crimes. It presents a Secure Intelligent Framework for Anti-Money Laundering (SIFAML). This framework is new and includes two ma...
Autor:
Tarek S. Sobh, Awad H. Khalil
Publikováno v:
Recent Patents on Computer Science. 11:289-301
Autor:
Tarek S. Sobh
Publikováno v:
Recent Patents on Computer Science. 11:109-120
Autor:
Tarek S. Sobh, Magdy A. AbdElbar
Publikováno v:
Recent Patents on Computer Science. 10:330-339
Autor:
Awad H. Khalil, Tarek S. Sobh
Publikováno v:
EPiC Series in Computing.
Nowadays, with the wide applications of distributed systems, web-based applications, and communications systems over the Internet for carrying data between users such as terminal client and computer/server or communications between different devices
Publikováno v:
Wireless Personal Communications. 87:1191-1208
Critical MANET environments such as military battlefields and disaster recovery operations impose a number of requirements (such as the need for robustness and performance within high mobility scenarios), and constraints (hostile attacks, battery lim
Publikováno v:
Journal of Money Laundering Control. 18:304-329
Purpose – This paper aims to compete and detect suspicious transactions that can lead to detecting money laundering cases. Design/methodology/approach – This paper presents a plan-based framework for anti-money laundering systems (PBAMLS). Such a
Publikováno v:
International Journal of Information Technology and Computer Science. 7:42-49
Identity management has emerged as important issue for reducing complexity and improving user experience when accessing services. In addition to, recently authentication services added SAML to the range of authentication options to be available to cl
Autor:
Tarek S. Sobh, Medhat Fakhry
Publikováno v:
International Journal of Information Technology and Computer Science. 6:18-27
Traditional distributed database transaction applications within large organizations often involve a large number of resources. In this case, people and DDBMSs distributed over a wide geographic area, may introduce conflict between heterogeneous syst