Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Wasim A. Al-Hamdani"'
Autor:
Wasim A. Al-Hamdani
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 2, Iss 4, Pp 19-42 (2007)
Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.All these adoptions are depend
Externí odkaz:
https://doaj.org/article/9e8f86b9237e430e99641dbcd8161013
Publikováno v:
Cluster Computing. 25:2125-2141
Data analytics projects span all types of domains and applications. Researchers publish results using certain datasets and classification models. They present results with a summary of the performance metrics of their evaluated classifiers. However,
Publikováno v:
Advances in Security, Networks, and Internet of Things ISBN: 9783030710163
In this chapter, the usability of voice biometric authentication is investigated. In doing so, we first studied the current status of Internet of Things [IoT] authentication technologies. We subsequently determined that existing authentication system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4fbe1d4b57c0b50e05b848d233e3a231
https://doi.org/10.1007/978-3-030-71017-0_5
https://doi.org/10.1007/978-3-030-71017-0_5
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
In this paper, we explore the use of the deep learning approach for replay spoof detection in speaker verification systems. Automatic speaker verifications (ASVs) can be easily spoofed by previously recorded genuine speech. In order to counter the is
Publikováno v:
SSCI
Speaker verification is a promising Internet of Things (IoT) user authentication model. However, verifying the identity of an individual using speech utterance is challenging especially in the presence of replay spoofing attacks, where attackers can
Behavioral biometric authentication is considered as a promising approach to securing the internet of things (IoT) ecosystem. In this paper, we investigated the need and suitability of employing voice recognition systems in the user authentication of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::30ef9a80a829df3cc2e7effae3da7853
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 1074:012024
The student admission process is a critical step from both student and university perspectives. The students will benefit if the universities take admission decisions sooner rather than later, leaving them time to opt for another university in case o
Autor:
David Crowe, Wasim A. Al-Hamdani
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 5:1-17
This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control
Autor:
Wasim A. Al-Hamdani
Publikováno v:
International Journal of Information Security and Privacy. 3:43-67
This work introduces three models to measure information security compliance. These are the cardinality model, the second’s model, which is based on vector space, and the last model is based on the priority principle. Each of these models will
Autor:
Wasim A. Al-Hamdani
Enterprise Resource Planning (ERP) software is business-management software that allows an organization to use a system of integrated applications to manage the business. ERP software often contains highly confidential information that is vital to a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f3cc6cb27fc51ed12cdbf942d3e7ad3
https://doi.org/10.4018/978-1-4666-6583-5.ch005
https://doi.org/10.4018/978-1-4666-6583-5.ch005