[email protected] : الايميل
دكتوراo تكنولوجيا شبكات المعلومات
Internetwork Technology, Network Security, 5G, AI, Communications
Machine learning-based PortScan attacks detection using OneR classifier
PortScan attacks are a common security threat in computer networks, where an attacker systematically scans a range of network ports on a target system to identify potential vulnerabilities. Detecting such attacks in a timely and accurate manner is crucial to ensure network security. Attackers can determine whether a port is open by sending a detective message to it, which helps them find potential vulnerabilities.
Performance evaluation of RYU controller under distributed denial of service attacks
Distributed denial of service (DDoS) attacks have been identified as one of the greatest threats to software-defined networking (SDN) because they are highly effective, hard to detect, and easy to use, and they take advantage of vulnerabilities in which the new architecture still exists.
Hybrid Wireless Range Extender : LTE (3G/4G) Over Wi-Fi
The increasing of modern devices and sensors everywhere and the Internet of things enter in many other things in our world, for that the increase of the internet demand has become everywhere with ideal coverage area. Combine Wi-Fi internet access with a mobile network and blanket coverage, is best way to provide the internet everywhere with fewer base-stations.
Radio Access Network Techniques Beyond 5G Network: A brief Overview
A brief Overview about Radio Access Network Techniques Beyond 5G Network
Improved Coot Optimization Algorithm Based Energy Aware Multi-Hop Routing Protocol for Vehicular Adhoc Networks
Intelligent Transportation system becomes a hot research topic, afterwards Internet of Things (IoT)-based sensors have been efficiently integrated with vehicular Adhoc networks (VANET). Routing is a challenging issue in VANET to enable the effectual communication of data. Computational Intelligence (CI) is an emerging field that applies or develops a set of nature-inspired algorithms and methodologies to overcome challenging problems in real-time.
لا توجد بحوث منشورة