To search, Click below search items.
All Published Papers Search Service
Title
Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks
Author
Ghadah Aldabbagh
Vol. 21 No. 1 pp. 152-161
Keywords
D2D communications, 5G, ProSe , C-V2X, resource scheduling, power control.
Honeypots Tools Study and Analysis
Sultan Al-Jameel and Adwan Alownie Alanazi
Vol. 21 No. 1 pp. 162-173
Honeypot, Security, low, medium, high, production, research, PentBox, honeydrive , attackers.
Social Media Security and Attacks
Sarah Almalki, Reham Alghamdi, Gofran Sami, and Wajdi Alhakami
Vol. 21 No. 1 pp. 174-183
Social media security; Social media attacks; Privacy. Social media threats
SECURITY THREATS AND ATTACKS IN CLOUDSECURITY THREATS AND ATTACKS IN CLOUD
Asma Mohammed, Jamilah Al khathami and Wajdi Alhakami
Vol. 21 No. 1 pp. 184-191
Cloud Computing; Security; Attacks; Threats.