Search Results - "Haddadi, Mohamed"
-
1
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment
Published in Journal of network and systems management (01-03-2024)“…Over the past few years, there has been a consistent increase in the number of Internet of Things (IoT) devices utilizing Cloud services. However, this growth…”
Get full text
Journal Article -
2
SPGDAD: Slow HTTP-Get denial of service attack detection using ontology
Published in Information security journal. (24-10-2024)Get full text
Journal Article -
3
DoS-DDoS: TAXONOMIES OF ATTACKS, COUNTERMEASURES, AND WELL-KNOWN DEFENSE MECHANISMS IN CLOUD ENVIRONMENT
Published in EDPACS (04-05-2018)“…Cloud computing has become a suitable provider of services for organizations as well as individuals through the Internet. Generally, these services become…”
Get full text
Journal Article -
4
A SINGLE-PACKET IP TRACEBACK: COMBATING DOS-DDOS ATTACKS
Published in EDPACS (03-10-2022)“…Cyber-attacks such as Denial of Service (DoS) and Distributed Denial of Service(DDoS) can affect Internet security so that they become a major threat to the…”
Get full text
Journal Article -
5
Well-known Open-Source Cloud Computing Platforms
Published in 2021 International Conference on Information Systems and Advanced Technologies (ICISAT) (27-12-2021)“…Cloud computing is an adaptive model that provides resources to end-users. This model moves many organizations to develop open-source cloud computing…”
Get full text
Conference Proceeding -
6
Intrusion Detection Systems using Data Mining Techniques: A comparative study
Published in 2021 International Conference on Information Systems and Advanced Technologies (ICISAT) (27-12-2021)“…Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The…”
Get full text
Conference Proceeding