74 results on '"Albermany, Salah A."'
Search Results
2. Simulation Secure MQTT Protocol Based on TLS in IoT-Fog Computing Environment
3. Computational Models to Prove Security Protocols Against Adversary
4. Use Multichannel EEG-Based Biometrics Authentication Signal in Real Time Using Neural Network
5. Intrusion Detection in the IoT-Fog Adopting the GRU and CNN: A Deep Learning-Based Approach
6. Computational Models to Prove Security Protocols Against Adversary
7. Alteration Approach for Data Cryptography Based on Grigorchuk’s Group Rules to Data Mining Objective with Cloud Computing
8. Simulation Secure MQTT Protocol Based on TLS in IoT-Fog Computing Environment
9. Using Symmetric Group to Generate Dynamic S-box
10. EEG Authentication System Using Fuzzy Vault Scheme
11. Proposed Method to Generated Values of the RADG Design by Lattice and Logistic Map
12. Malware Clustering Using Integer Linear Programming
13. Improving Extreme Learning Machine Accuracy Utilizing Genetic Algorithm for Intrusion Detection Purposes
14. Network Performance and Technological Feasibility of Unmanned Aerial Vehicles for Network Extension
15. Enhancement of KASUMI algorithm by adding hamming code
16. Using EEG features of eye-blinking for the paralyzed patient
17. Enhancement in S-Box of BRADG Algorithm
18. An Efficient Image Encryption Method Based on Enhanced Josephus Problem and a Non-Invertible Economic Map
19. A survey on some methods which used to solve equations: Case study the differential equations.
20. Enhancement A5/1 stream cipher algorithm as lightweight generator.
21. Utilizing brainwaves with chaos logistic map to generate authentication ID.
22. Malware Clustering Using Integer Linear Programming
23. Proposed Method to Generated Values of the RADG Design by Lattice and Logistic Map
24. Improving Extreme Learning Machine Accuracy Utilizing Genetic Algorithm for Intrusion Detection Purposes
25. Construction: Materials Processing and Technologies
26. Proposing an IOT Secure Framework for Monitoring COVID-19 Patients
27. DDOS attack detection using machine learning algorithm in SDN network
28. Enhancement in S-Box of BRADG Algorithm
29. BCH encoding via wavelets transmission.
30. An energy-efficient RAM cell based on novel majority gate in QCA technology
31. Energy Theft Detection with Determine Date Theft Period for State Grid Corporation of China Dataset
32. 4th International Scientific Conference of Engineering Sciences and Advances Technologies (IICESAT), 3-4 June 2022.
33. Utilizing quantum genetic algorithm with TM to solve DEs
34. Data Protection Methods and Intrusion Detection Systems Employing Machine Learning and Deep Learning in the IoT: A Comparative Review
35. Reaction Automata Direct Graph (RADG) Design on Elliptic Curve Cryptography
36. 4thInternational Scientific Conference of Engineering Sciences and Advances Technologies (IICESAT), 3-4 June 2022
37. Keyless Security in Wireless Networks
38. EEG authentication system using fuzzy vault scheme.
39. Ibn Al-Haitham International Conference for Pure and Applied Sciences, University of Baghdad, Baghdad, Iraq (IHICPAS)
40. EEG authentication system using fuzzy vault scheme
41. Auto Transition Function in RADG
42. HSH-algebra with application
43. The Dominant Nodes Index in Shortest Paths (DNISP) as A Local Measure of Source Looking for the Target in Complex Networks
44. New Block Cipher Key with RADG Automata
45. Performance of Differential CSK under Color Noise: A Comparison with CSK
46. Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)
47. Authentication of RSA via BAN logic
48. Linear Cryptanalysis of S-Box BRADG
49. New random block cipher algorithm
50. A secure MAC protocol for Cognitive Radio Networks (SMCRN).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.