M Jemmali, A Ben Hmida, AY Sarhan - Journal of Network and Systems …, 2023 - Springer
Data breaches are a critical issue and have become one of the top widespread risks in today's data-driven digital environment. Hence, Secure data outsourcing is essential in …
AY Sarhan - PeerJ Computer Science, 2023 - peerj.com
Abstract The Interconnected Network or the Internet has revolutionized digital communications. It has expanded worldwide over the past four decades due to numerous …
Sensitive data, such as financial, personal, or classified governmental information, must be protected throughout its cycle. This paper studies the problem of safeguarding transmitted …
Abstract Transport Layer Security Inspection (TLSI) enables enterprises to decrypt, inspect and then re-encrypt users' traffic before it is routed to the destination. This breaks the end-to …
Deep packet filtering (DPF) has been demonstrated as an essential technique for effective fine-grained access controls, but it is commonly recognized that the technique may invade …
M Jemmali, H Alquhayz - 2020 international conference on …, 2020 - ieeexplore.ieee.org
In a critical constraint the network traffic must be more controlled than a normal situation. The paper considers a router dispatching problem in case of bespoke communication and …
Cryptography is defined as the analysis of encryption or secretive writing of information with the use of mathematical & logical concepts in order to prevent data from being …
Software Defined Networking (SDN) is increasingly being used in data centers as well as enterprise networks. In an environment that has strict compliance requirements, such as …
Z Zhao, C Hsu, L Harn, Q Yang… - … and Mobile Computing, 2021 - Wiley Online Library
Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients and medical sensors. Patients can share real‐time medical data collected in IoMT with …