咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 1 篇 stacking ensembl...
  • 1 篇 routing
  • 1 篇 random forest
  • 1 篇 cybersecurity an...
  • 1 篇 deep learning
  • 1 篇 hamming distance
  • 1 篇 fuzzy
  • 1 篇 biometric securi...
  • 1 篇 stego
  • 1 篇 protocol
  • 1 篇 decision tree
  • 1 篇 sensor
  • 1 篇 network
  • 1 篇 ae network
  • 1 篇 logic
  • 1 篇 awareness
  • 1 篇 2d clm
  • 1 篇 healthcare appli...
  • 1 篇 ransomware embed...
  • 1 篇 lsb

机构

  • 3 篇 department of el...
  • 3 篇 security enginee...
  • 1 篇 saudi aramco cyb...
  • 1 篇 school of comput...
  • 1 篇 computer science...
  • 1 篇 computer science...
  • 1 篇 computer science...
  • 1 篇 comp.info scienc...
  • 1 篇 department of el...
  • 1 篇 information syst...
  • 1 篇 computer network...
  • 1 篇 department of in...
  • 1 篇 computer science...
  • 1 篇 computer science...
  • 1 篇 computer science...
  • 1 篇 it-department-al...

作者

  • 3 篇 iman almomani
  • 3 篇 walid el-shafai
  • 2 篇 aala alkhayer
  • 1 篇 iman akour
  • 1 篇 razan al sharaa
  • 1 篇 khalid alissa
  • 1 篇 mohammad alauthm...
  • 1 篇 esra’a abdullah
  • 1 篇 fatma khallaf
  • 1 篇 omar almomani
  • 1 篇 iman m. almomani
  • 1 篇 albandari alsuma...
  • 1 篇 ahmed m.manasrah
  • 1 篇 fathi e.abd el-s...
  • 1 篇 amaal al shwait
  • 1 篇 maha k. saadeh
  • 1 篇 ammar almomani
  • 1 篇 el-sayed m.el-ra...
  • 1 篇 sumayh s.aljamee...

语言

  • 5 篇 英文
检索条件"作者=iman Almomani"
5 条 记 录,以下是1-10 订阅
排序:
Novel Ransomware Hiding Model Using HEVC Steganography Approach
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1209-1228页
作者: iman almomani Aala AlKhayer Walid El-Shafai Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School for Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Ransomware is considered one of the most threatening *** solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: iman almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks
收藏 引用
International Journal of Communications, Network and System Sciences 2011年 第6期4卷 403-415页
作者: iman M. almomani Maha K. Saadeh 不详
Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
收藏 引用
Computer Systems Science & Engineering 2023年 第9期46卷 3599-3618页
作者: Walid El-Shafai Fatma Khallaf El-Sayed M.El-Rabaie Fathi E.Abd El-Samie iman almomani Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electrical Engineering Faculty of EngineeringAhram Canadian UniversityGizaEgypt Computer Science Department King Abdullah II School of Information TechnologyThe University of JordanJordan11942Jordan
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,*** presented solution depends on the features of discrete cosine tr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2499-2517页
作者: Ammar almomani iman Akour Ahmed M.Manasrah Omar almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa School of Computing Skyline University CollegeUniversity City of SharjahP.O.Box 1797SharjahUnited Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Information Systems Department College of Computing&InformaticsUniversity of SharjahUnited Arab Emirates Comp.Info Sciences(CIS)Division Higher Colleges of TechnologySharjahUnited Arab Emirates Computer Sciences Department Yarmouk UniversityIrbidJordan Computer Network and Information Systems Department The World Islamic Sciences and Education UniversityAmman11947Jordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network ***,executed through network packets,pose a significant challenge for firewalls t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论