To search, Click below search items.
All Published Papers Search Service
Title
Bartering Method for Improving Privacy of LBS
Author
Abdullah M Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, Sarah Alqahtani
Vol. 19 No. 2 pp. 207-213
Keywords
Privacy, Security, LBS, POI, Bartering
A Survey on Resource Allocation Algorithms and Models in Cloud Computing
Noura AlDossary, Sarah AlQahtani, Haya AlUbaidan and Atta-ur-Rahman
Vol. 22 No. 3 pp. 776--78
Cloud Computing, Resource Allocation, Scheduling, Virtual Machine.
SYN Flood DoS Detection System Using Time Dependent Finite Automata
Noura AlDossary, Sarah AlQahtani, Reem Alzaher and Atta-ur-Rahman
Vol. 23 No. 6 pp. 147-154
Denial of Service (DoS); Finite Automata (FA); Time-Dependent Finite Automata (TDFA); SYN Flood; Intrusion Detection System
A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network
Raed Alsaqour, Maha Abdelhaq, Njoud Alghamdi, Maram Alneami, Tahani Alrsheedi, Salma Aldghbasi, Rahaf Almalki, Sarah Alqahtani
Vol. 23 No. 9 pp. 111-119
Mobile ad hoc network; Routing Protocols; AODV; DSR; Resource Consumption Attack.