Search

Your search keyword '"Albermany, Salah A."' showing total 74 results

Search Constraints

Start Over You searched for: Author "Albermany, Salah A." Remove constraint Author: "Albermany, Salah A."
74 results on '"Albermany, Salah A."'

Search Results

1. Alteration Approach for Data Cryptography Based on Grigorchuk’s Group Rules to Data Mining Objective with Cloud Computing

2. Simulation Secure MQTT Protocol Based on TLS in IoT-Fog Computing Environment

3. Computational Models to Prove Security Protocols Against Adversary

4. Use Multichannel EEG-Based Biometrics Authentication Signal in Real Time Using Neural Network

5. Intrusion Detection in the IoT-Fog Adopting the GRU and CNN: A Deep Learning-Based Approach

9. Using Symmetric Group to Generate Dynamic S-box

11. Proposed Method to Generated Values of the RADG Design by Lattice and Logistic Map

12. Malware Clustering Using Integer Linear Programming

13. Improving Extreme Learning Machine Accuracy Utilizing Genetic Algorithm for Intrusion Detection Purposes

17. Enhancement in S-Box of BRADG Algorithm

19. A survey on some methods which used to solve equations: Case study the differential equations.

20. Enhancement A5/1 stream cipher algorithm as lightweight generator.

21. Utilizing brainwaves with chaos logistic map to generate authentication ID.

29. BCH encoding via wavelets transmission.

31. Energy Theft Detection with Determine Date Theft Period for State Grid Corporation of China Dataset

38. EEG authentication system using fuzzy vault scheme.

Catalog

Books, media, physical & digital resources