Location-based kerberos authentication protocol NT Abdelmajid, MA Hossain, S Shepherd, K Mahmoud 2010 IEEE Second International Conference on Social Computing, 1099-1104, 2010 | 32 | 2010 |
Dynamically detecting security threats and updating a signature-based intrusion detection system’s database MY AlYousef, NT Abdelmajeed Procedia Computer Science 159, 1507-1516, 2019 | 30 | 2019 |
Innovative signature based intrusion detection system: Parallel processing and minimized database AH Almutairi, NT Abdelmajeed 2017 International Conference on the Frontiers and Advances in Data Science …, 2017 | 29 | 2017 |
Improved Kerberos security protocol evaluation using modified BAN logic NT Abdelmajid, MA Hossain, S Shepherd, K Mahmoud 2010 10th IEEE International Conference on Computer and Information …, 2010 | 14 | 2010 |
Location based model for prevention DNS spoofing N Abdelmajid, A Amin, SAR Farhan Proceedings of the 2020 International Conference on Internet Computing for …, 2020 | 6 | 2020 |
Innovative signature based intrusion detection system AH Almutairi, NT Abdelmajeed Information Technology, 1-7, 2017 | 6 | 2017 |
Identity-of-things model using composite identity on permissioned blockchain network AHM Amin, N Abdelmajid, FN Kiwanuka 2020 Seventh International Conference on Software Defined Systems (SDS), 171-176, 2020 | 3 | 2020 |
The Impact of Social Networks on Students’ Electronic Privacy in Saudi Arabia Society NT Abdelmajeed Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume …, 2019 | 2 | 2019 |
Global position system location-based authentication (KERBEROS AS AN EXAMPLE) N Abdelmajid, KW Mahmoud ITEE Journal: Inform. Technol. and Elec. Engin 5 (3), 13-18, 2016 | 2 | 2016 |
The Necessity of Cybersecurity for Community Safety the Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and … N Abdelmajid International Journal of Information & Digital Security 1 (1), 20-31, 2023 | 1 | 2023 |
Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices AHM Amin, FN Kiwanuka, NTJ Abdelmajid, SH AlKaabi, SKAR Ahli Research Anthology on Convergence of Blockchain, Internet of Things, and …, 2023 | 1 | 2023 |
Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of Believes, Particularly … NT Abdelmajid University of Bradford, 2011 | 1 | 2011 |
A PRELIMINARY QUANTITATIVE STUDY ON THE PARENTAL ROLE IN PROTECTING CHILDREN FROM ELECTRONIC BLACKMAIL: THE CASE OF DUBAI/UAE N Abdelmajid, D Xanthidis, S Paul Journal of Theoretical and Applied Information Technology 101 (1), 177-185, 2024 | | 2024 |
Survey on Updating IDSs’ Signatures Databases MY Al-Yosef, NT Arar Journal of Information Security and Cybercrimes Research 1 (1), 40-48, 2018 | | 2018 |
الأمن الإلكتروني ضرورة ملحة لأمن المجتمعات" مقترح الأسرة الآمنة الخاص بتوعية المجتمع العربي الخليجي في أمن المعلومات لكل من الطلاب والوالدين" عبدالمجيد, نبيه طارق جامعة نايف العربية للعلوم الأمنية, 2018 | | 2018 |
Parental Role in Protecting Children and Dangers of Social Networks Sites N T Abdelmajeed جامعة نايف العربية للعلوم الأمنية, 2018 | | 2018 |
" Where are you" based authentication: An improved security protocol using BAN logic N Abdelmajid, A Hossain, S Shepherd, M Khaled | | 2008 |
Global Position System Location-Based Authentication NT Abdelmajid, KW Mahmoud | | |