-
1Report
المؤلفون: Al-Mousa, Mohammad Rasmi
المصدر: International Journal of Advanced Trends in Computer Science and Engineering, 2020
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2101.01395
-
2Report
المؤلفون: Haimour, Sana, AL-Mousa, Mohammad Rasmi, Marie, Rashiq R.
المصدر: International Journal of Advanced Trends in Computer Science and Engineering, 2020
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2101.00897
-
3Conference
المؤلفون: Asassfeh, Mahmoud, Samara, Ghassan, Zaid, Ali Abu, Laila, Dena Abu, Al-Anzi, Shouq, Alqammaz, Abdullah, Al Smadi, Ahmad, Al-Shaikh, Ala'a, Al-Mousa, Mohammad Rasmi
المصدر: 2024 International Jordanian Cybersecurity Conference (IJCC) ; page 131-135
-
4Conference
المؤلفون: Tehrani, Fahimeh Jamshidian, Nasihatkon, Behrooz, Al-Qawasmi, Khaled, Al-Mousa, Mohammad Rasmi, Boostani, Reza
المصدر: 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)
-
5Conference
المصدر: 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)
-
6Conference
المؤلفون: AL-Sammarraie, Yahya Qusay, AL-Qawasmi, Khaled, AL-Mousa, Mohammad Rasmi, Desouky, Sameh F.
المصدر: 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)
-
7Conference
المصدر: 2017 8th International Conference on Information Technology (ICIT)
-
8Conference
المصدر: 2017 8th International Conference on Information Technology (ICIT) ; page 464-468
-
9Conference
المؤلفون: Al-Utrakchi, Enas Ayman, AL-Mousa, Mohammad Rasmi
المصدر: International Conference on Information Technology; 2015, p349-353, 5p
مصطلحات موضوعية: COMPUTER network security, INTERNET traffic, INFORMATION technology security, INTRUSION detection systems (Computer security), DENIAL of service attacks, SECURITY management, K-nearest neighbor classification