السجلات المعروضة 81 -- 93 من 93

    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Visualization as a mean of big data management: Using Qatar's electricity consumption data 

      Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...
    • Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques 

      Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • Dynamic security metrics for measuring the effectiveness of moving target defense techniques 

      Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors ( Elsevier Ltd , 2018 , Article)
      Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
    • Deep learning for detection of routing attacks in the internet of things 

      YAVUZ, Furkan Yusuf; Unal, Devrim; GÜL, Ensar ( Atlantis Press , 2018 , Article)
      Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Parallelizing exact motif finding algorithms on multi-core 

      Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M. ( Springer Science+Business Media , 2014 , Article)
      The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...