Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Yahia A. Fadlalla"'
Autor:
Muawia A. Elsadig, Yahia A. Fadlalla
Publikováno v:
Journal of Computer Science & Computational Mathematics. :59-66
Autor:
Yahia A. Fadlalla, Muawia A. Elsadig
Publikováno v:
International Journal of Computing and Digital Systemss. 7:59-66
Publikováno v:
2018 21st Saudi Computer Society National Computer Conference (NCC).
a computer worm is malicious software that has the capability to spread and replicate itself into a computer network. A polymorphic worm is a specific type of worm that changed its structure in every appearance or new instance. A polymorphic worm is
Autor:
Yahia A. Fadlalla, Muawia A. Elsadig
Publikováno v:
2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
A covert channel is a communication channel that is subjugated for illegal flow of information in a way that violates system security policies. It is a dangerous, invisible, undetectable, and developed security attack. Recently, Packet length covert
Autor:
Yahia A. Fadlalla, Muawia A. Elsadig
Publikováno v:
2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS).
When information is leaked covertly in a way that violate a system's security policy, a covert channel does exist. A covert channel is a channel that is exploited for illicit information flow. It is a serious and often undetectable security threat. P
Publikováno v:
2017 Sudan Conference on Computer Science and Information Technology (SCCSIT).
Identity Document (ID) forgery is a process by which authorized identity document is modified and\or copied by unauthorized party or parties to be used illegally. The rapid development of personal computers, scanners, and color printers a long with t
Publikováno v:
2017 9th IEEE-GCC Conference and Exhibition (GCCCE).
Mobile Ad Hoc Networks (MANETs) are rapidly advanced and popularly accepted. They play a vital role in different applications and consequently receive a great deal of attention. However, since a MANET has no infrastructure due to its dynamic topology
Autor:
Muawia A. Elsadig, Yahia A. Fadlalla
Publikováno v:
Fourth International Conference on Advances in Information Processing and Communication Technology - IPCT 2016.
Autor:
Yahia A. Fadlalla, Muawia A. Elsadig
Publikováno v:
Indian Journal of Science and Technology. 9
Vehicular Ad-hoc Networks (VANETs) are sought to control traffic, avoid accidents, and control other aspects of traffic. It (VANET) is a piece of critical infrastructure that bolsters traffic management efficiency and road safety. Nowadays, VANET app