Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

Improving arabic fake news detection using optimized feature selection

B Hawashin, A Althunibat, T Kanan… - 2023 international …, 2023 - ieeexplore.ieee.org
It is of no doubt that the advent of social media has brought several important benefits.
However, there have been also attempts of abusing social media in several ways, one of …

Pubic cloud computing: Big three vendors

A Alkhatib, A Al Sabbagh… - … Conference on Information …, 2021 - ieeexplore.ieee.org
There has been a significant increase in the adoption of cloud computing, and Azure, AWS
and Google Cloud are striving to become the best cloud providers. Various extraordinary …

[PDF][PDF] An Improved Cross-Layer Proactive Congestion in Wireless Networks.

GM Abdulsahib, OI Khalaf - International Journal of Advances in Soft …, 2021 - i-csrs.org
Congestion is when the sender aims to send data at a rapidity relatively high than is feasible
with network connections or nodes. It is challenging to indicate this issue under the radio …

Performance Evaluation of Routing Protocols in Enterprise Networks

W Mwewa, SC Lubobya - American Journal of Computing and …, 2022 - ajpojournals.org
This paper evaluates the performance of routing protocols such as OSPF, EIGRP and IS-IS
in an enterprise network. Routing protocols are rules that govern the best route to transfer …

An intelligent vice cluster head election protocol in WSN

G Samara, MA Hassan, Y Zayed - arXiv preprint arXiv:2112.01310, 2021 - arxiv.org
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a
wireless network that can be accessed remotely; this technology has become increasingly …

Automated Business Rules Classification Using Machine Learning to Enhance Software Requirements Elicitation

M Lafi, A AbdelQader - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The elicitation of software requirements is an essential phase in building commercial
software. Business rules can be an important source of software requirements specifications …

Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

Z Mohammad, AAA Alkhatib, M Lafi… - 2021 International …, 2021 - ieeexplore.ieee.org
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …

Diverse Dynamic Routing Protocols Distribution in the Large Network with Route Redistribution Techniques using GNS3

MN Shehzad, UR Kamboh, MD Taqdees… - 2021 International …, 2021 - ieeexplore.ieee.org
Routing Protocols (RP) have major role in a network to find the optimal path between the
connected routers. In designed network Internet Service providers (ISP) use many types of …