[HTML][HTML] Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

An uncertainty trust assessment scheme for trustworthy partner selection in online games

P Srikanth, A Kumar, M Hedabou - IEEE Access, 2022 - ieeexplore.ieee.org
Purpose: An advances in technology, offline activities are moving toward online by creating
the virtual environment (VE). The VE applications include video conferences, video chats …

[HTML][HTML] Multi-objective optimization design of steel structure building energy consumption simulation based on genetic algorithm

Y Ren, S Rubaiee, A Ahmed, AM Othman… - Nonlinear …, 2022 - degruyter.com
In order to solve the problems of data acquisition, quantitative analysis and model solving in
the field of construction schedule optimization, a construction schedule optimization system …

Big data intelligent collection and network failure analysis based on artificial intelligence

J Ding, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2022 - informatica.si
In order to explore the intelligent collection of big data and network fault analysis, this paper
proposes a big data intelligent collection and network fault analysis based on artificial …

[PDF][PDF] Knapsack based ECC encryption and decryption.

RR Ramasamy, MA Prabakar, MI Devi… - Int. J. Netw …, 2009 - ijns.jalaxy.com.tw
Abstract Elliptic Curve Cryptography provides a secure means of exchanging keys among
communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and …

Study on library management system based on data mining and clustering algorithm

J Wang, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2023 - informatica.si
In order to improve the information retrieval and resource sharing abilities of the library and
establish an intelligent library information management system, alibrary management …

[HTML][HTML] Implementation of network information security monitoring system based on adaptive deep detection

J Niu, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
For a better detection in Network information security monitoring system, the author
proposes a method based on adaptive depth detection. A deep belief network (DBN) was …

[HTML][HTML] Research on data mining method of network security situation awareness based on cloud computing

Y Zhou, G Zhao, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
Due to the complexity and versatility of network security alarm data, a cloud-based network
security data extraction method is proposed to address the inability to effectively understand …

Design and Study of Urban Rail Transit Security System Based on Face Recognition Technology

Z Guo, Z Xiao, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2022 - informatica.si
Due to the relatively closed environment, dense personnel, large passenger flow, long line
and wide coverage of urban rail transit, it is difficult to prevent terrorism. Identity recognition …

[PDF][PDF] Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms.

TC Lin - Int. J. Netw. Secur., 2009 - ijns.jalaxy.com.tw
Let IFq be a finite field of characteristic two and let φ be the Frobenius endomorphism of an
elliptic curve. To find or improve efficient algorithms for scalar multiplication sP of point P in …