Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

Arabic text categorization: A comparison survey

T Kanan, A AbedAlghafer, GG Kanaan… - 2021 International …, 2021 - ieeexplore.ieee.org
Text categorization acquires more significance considering the plenty of text added
continually on the web. The lack of huge and free Arabic datasets makes it more difficult to …

[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.

A Abusukhon, B Hawashin, M Lafi - … of Advances in Soft Computing & Its …, 2021 - i-csrs.org
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …

Comparison between IPv4 and IPv6 using OSPF and OSPFv3 on riverbed modeler

N Jain, A Payal - 2019 IEEE International conference on …, 2019 - ieeexplore.ieee.org
In multiple path networks, the routing protocols are used to find the low-cost shortest path
and the protocols which give its best measurements are selected for network execution. The …

Analysis of link failures and recoveries on 6to4 tunneling network with different routing protocol

N Jain, A Payal, A Jain - Journal of Intelligent Manufacturing, 2023 - Springer
Failure recovery is an essential discussion in communication to guarantee the network's
undisturbed and reliable service. Failed links have been affecting the communication …

A novel recommender system using interest extracting agents and user feedback

B Hawashin, A Mansour, F Fotouhi… - 2021 International …, 2021 - ieeexplore.ieee.org
Recommender Systems have been used widely to provide suggestions to users based on
their interests. Although many works have proposed recommender systems in the literature …

[PDF][PDF] Performance Comparison of Routing Protocols

A Albaour, Y Aburawi - International Research Journal of …, 2021 - academia.edu
This paper focuses the study of different routing protocols used in computer networks. A
routing protocol is a protocol that specifies how routers communicate with each other …

Water preservation using IoT: A proposed IoT system for detecting water pipeline leakage

A Abusukhon, F Altamimi - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
In the recent era, the Internet of Things (IoT) technology contributes in the development of
many activities and aspects in our life. One of these aspects is agriculture. Agriculture is …

Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

Z Mohammad, AAA Alkhatib, M Lafi… - 2021 International …, 2021 - ieeexplore.ieee.org
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …