Blockchain technology as a Fog computing security and privacy solution: An overview

YI Alzoubi, A Al-Ahmad, H Kahtan - Computer Communications, 2022 - Elsevier
The emergent of Fog computing as an extension of Cloud computing, from the center of the
internet architecture to the IoT end user's devices, aims to enhance the processing power of …

Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

[PDF][PDF] Fog computing security and privacy issues, open challenges, and blockchain solution: An overview.

YI Alzoubi, A Al-Ahmad, A Jaradat - International Journal of Electrical …, 2021 - academia.edu
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance
the low latency IoT applications and meet the distribution nature of these devices. However …

An Evaluation of Key Adoption Factors towards Using the Fog Technology

O Ali, A Shrestha, A Jaradat, A Al-Ahmad - Big Data and Cognitive …, 2022 - mdpi.com
Fog technology is one of the recent improvements in cloud technology that is designed to
reduce some of its drawbacks. Fog technology architecture is often widely distributed to …

Towards the definition of a research agenda on mobile application testing based on a tertiary study

PH Kuroishi, JC Maldonado, AMR Vincenzi - Information and Software …, 2024 - Elsevier
Context: Mobile application testing has gained considerable attention in recent years since
mobile devices have become increasingly present in our lives. Unlike traditional software …

Overview on Case Study Penetration Testing Models Evaluation

AS Al-Ahmad, HK Al-Ani, YI Alzoubi - 2023 - figshare.cardiffmet.ac.uk
Model evaluation is a cornerstone of scientific research as it represents the findings'
accuracy and model performance. A case study is commonly used in evaluating software …

COCAME: A Computational Offloading in Cloud Assisted Mobile Environments Structure to Enhance Performance and Energy

R Aishwarya, G Mathivanan - 2024 14th International …, 2024 - ieeexplore.ieee.org
The widespread popularity and affordability of smart mobile devices provide users with a
fantastic interface. However, inherent hardware limitations, encompassing storage, CPU …

Towards new challenges of modern Pentest

DD Bertoglio, A Gil, J Acosta, J Godoy… - … conference on WorldS4, 2023 - Springer
With the increasing number of Internet-based resources and applications, the amount of
attacks faced by companies has increased significantly in the past years. Likewise, the …

Research on the Application of Penetration Testing Frameworks in Blockchain Security

K Chen, M Zhang, R Liang, J Chen, J Peng… - … on Computational & …, 2023 - Springer
Penetration testing is a widely used method to identify vulnerabilities in computer systems,
applications or networks. Due to the persistent evolution of blockchain technology …

[PDF][PDF] Fundamental Study of Penetration Testing on Mobile Cloud Computing

ABA Bakar, MS bin Che Mansor, MSA bin Omar… - ijaem.net
Penetration testing, ethical hacking, and white hat hacking are all synonymous terms used to
describe the activity of identifying and fixing flaws in a system. This study aims to provide a …