• Login
    Search 
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 48

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    EGovernment interoperability issues in Lithuania 

    Vitkauskaitė Elena; R Gatautis (proceeding of the Eight International Conference on Electronic Business, 2008)
    A survey for success factors of Web application development reveals that development methodologies, tools, and techniques are not considered as important by developers for the success of Web application development. Rapid ...
    Thumbnail

    Detecting Fake Followers in Twitter: A Machine Learning Approach 

    Ashraf Khalil; Hajjdiab Hassan; Al-Qirim Nabeel (IJMLC, 2017-12)
    Twitter popularity has fostered the emergence of a new spam marketplace. The services that this market provides include: the sale of fraudulent accounts, affiliate programs that facilitate distributing Twitter spam, as ...
    Thumbnail

    Survey of security protocols and vulnerabilities in unmanned aerial vehicles 

    Shafique, Arslan; Mehmood, Abid; Elhadef, Mourad (IEEE, 2021-03)
    With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility ...
    Thumbnail

    Sybil attacks in intelligent vehicular ad hoc networks: A review 

    Muhamad, Aveen; Elhadef, Mourad (Springer, Singapore, 2018-04)
    Vehicular Ad-hoc Networks (VANETs) are intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Many security techniques have been ...
    Thumbnail

    DoS Attacks and Countermeasures in VANETs 

    Ahmed, Wedad; Elhadef, Mourad (Springer, Singapore, 2018-04)
    Vehicular Ad Hoc Networks (VANETs) are ideal target to many attacks due to the large number of vehicles communicating with each other continually and instantly through a wireless medium. The main goal of VANETs is to enhance ...
    Thumbnail

    Securing Vehicular Ad-Hoc Networks: A DDoS Case Study 

    Al-Dhuraibi, Wedad Ahmed; Elhadef, Mourad (IEEE, 2021-01)
    Vehicular Ad-Hoc Network is an intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Vehicular Ad-Hoc Networks are ideal target ...
    Thumbnail

    Secure software engineering: A new teaching perspective based on the SWEBOK 

    Abu Talib, Manar; Khelifi, Adel; Jololian, Leon (Researchgate, 2010-01)
    Lack of a suitable set of controls during the development life cycle of software will lead to mistakes in the requirements, design, or code of software and, therefore, result in significant security vulnerabilities. This ...
    Thumbnail

    Secure software engineering: A new teaching perspective based on the SWEBOK 

    Abu Talib, Manar; Khelifi, Adel; Jololian, Leon (ResearchGate, 2010-01)
    Lack of a suitable set of controls during the development life cycle of software will lead to mis-takes in the requirements, design, or code of software and, therefore, result in significant security vulnerabilities. This ...
    Thumbnail

    Smart Visa System with Improved Security Features 

    Khelifi, Adel; Hashmi, Saleha; Darwich, Feras; Ali, Sarah; Al Tenaiji, Ali (Springer, Cham, 2020)
    With the growing number of fake and fraudulent companies that issue visas to UAE, people abroad seek a reliable system application to apply for UAE visa. Wasting money on non-creditable resources pushed people to complain ...
    Thumbnail

    IoT Testbed Security: Smart Socket and Smart Thermostat 

    Bettayeb, Meriem; Abu Waraga, Omnia; Abu Talib, Manar; Nasir, Qassim; Einea, Omar (IEEE, 2019-11)
    Internet of Things (IoT) technology is changing the shape of our lives, however they are raising many security issues. Attackers can exploit the security vulnerabilities of IoT devices for malicious ends. Assessing the ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 5

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorChaudhry, Shehzad Ashraf (27)ETAL.. (22)Irshad, Azeem (10)Elhadef, Mourad (5)Ati, Modafar (4)Abu Talib, Manar (3)Khelifi, Adel (3)Kumari, Saru (3)Mumtaz Bhutta, Muhammad Nasir (3)Wu, Fan (3)... View MoreSubject
    Security (48)
    Authentication (20)Privacy (8)Protocols (7)Drones (6)Elliptic curve cryptography (6)Internet of things (6)Anonymity (3)Cryptography (3)Incorrectness (3)... View MoreDate Issued2020 - 2022 (33)2010 - 2019 (14)2008 - 2009 (1)Has File(s)No (38)Yes (10)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV