Search Results - "Sahar Yousif Mohammed"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    A Two-Stage Hybrid Approach for Phishing Attack Detection Using URL and Content Analysis in IoT by Yousif Mohammed, Sahar, Aljanabi, Mohammad, Mijwil, Maad M., Ramadhan, Ali J., Abotaleb, Mostafa, Alkattan, Hussein, Albadran, Zainalabideen

    Published in BIO web of conferences (01-01-2024)
    “…The goal of phishing assaults is to trick users into giving up personal information by making them believe they need to act quickly on critical information…”
    Get full text
    Journal Article
  2. 2

    Metaverse: open possibilities by Mohammad Aljanabi, Sahar Yousif Mohammed

    “…To create a completely immersive, highly spatiotemporal, and self-sustaining virtual shared place for humans to play, work, and interact, the Metaverse is an…”
    Get full text
    Journal Article
  3. 3

    Navigating the Nexus: A systematic review of the symbiotic relationship between the metaverse and gaming by Mohammed, Sahar Yousif, Aljanabi, Mohammed, Gadekallu, Thippa Reddy

    “…•Present a detailed review on the impact of metaverse on the gaming industry and communities.•Present insights into key dimensions and mechanisms of the…”
    Get full text
    Journal Article
  4. 4

    Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning by Alaa Hamza Omran, Sahar Yousif Mohammed, Aljanabi, Mohammad

    “…This work presents a novel method for securing federated learning in healthcare applications, focusing on skin cancer classification. The suggested solution…”
    Get full text
    Journal Article
  5. 5

    Decision-making in Cybersecurity: A Bibliometric analysis by Aljanabi, Dr. mohammad

    “…This bibliometric analysis explores research trends and patterns in the intersection of decision-making and cybersecurity. Using Scopus data, we conducted a…”
    Get full text
    Journal Article