From post

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey.

, , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 10217-10245 (ноября 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Alawida, Moatsum
add a person with the name Alawida, Moatsum
 

Другие публикации лиц с тем же именем

Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model., , и . ICSCA, стр. 130-134. ACM, (2019)Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends., и . DASC/PiCom/CBDCom/CyberSciTech, стр. 1155-1162. IEEE, (2023)A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks., , , , и . IEEE Access, (2022)A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data., , , , и . Comput. Biol. Medicine, (декабря 2023)A deeper look into cybersecurity issues in the wake of Covid-19: A survey., , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8176-8206 (2022)IoT Adoption and Application for Smart Healthcare: A Systematic Review., , , , и . Sensors, 22 (14): 5377 (2022)DNA-Inspired Image Encryption: Leveraging Chaos for Enhanced Security., , , и . DCOSS-IoT, стр. 477-482. IEEE, (2024)A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments.. IEEE Trans. Ind. Informatics, 20 (8): 10530-10541 (августа 2024)A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups., , , , , , и . IEEE Access, (2020)A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence., , , , , и . IEEE Access, (2021)