Volgen
Muawya Naser
Muawya Naser
King Hussein School of Computing Sciences
Geverifieerd e-mailadres voor PSUT.edu.jo - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks
C Camara, P Peris-Lopez, H Martín, M Aldalaien
Sensors 18 (9), 2747, 2018
252018
Design and analysis of a true random number generator based on GSR signals for body sensor networks
C Camara, H Martín, P Peris-Lopez, M Aldalaien
Sensors 19 (9), 2033, 2019
212019
Security considerations in embedding RFID in'hajj'system
M Naser, M Rafie, R Budiarto, W Alsalihy
European Journal of Scientific Research 42 (1), 133-138, 2010
182010
ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks
Q Abu Al-Haija, M Al-Dala’ien
Journal of Sensor and Actuator Networks 11 (1), 18, 2022
172022
Gender effect on cloud computing services adoption by university students: case study of Saudi Arabia
AA Almazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation 7 (1), 155-177, 2019
152019
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage
MAAL Jarrah, L Karadsheh, M Naser, S Alhawari
Human performance technology: Concepts, methodologies, tools, and …, 2019
92019
Cryptography: Protocols, design, and applications
K Lek, N Rajapakse
Nova Science Publishers, 2012
62012
Internet of Things (IoT) security and privacy
MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili
Powering the Internet of Things With 5G Networks, 247-267, 2018
52018
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
M Al Majaly, M Rafie, R Budiarto
2009 International Conference on Signal Acquisition and Processing, 103-107, 2009
52009
Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto
IEEE Access 9, 116475-116484, 2021
42021
A note on the security of PAP
M Naser, P Peris-Lopez, R Budiarto, BR Álvarez
Computer communications 34 (18), 2248-2249, 2011
32011
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard
I Aldmour, R Budiarto, P Peris-Lopez
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (3 …, 2015
22015
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
NA Abuadhmah, M Naser, A Samsudin
Journal of Computer Science 6 (7), 723, 2010
22010
Clients Acceptance towards Mobile Banking Application in Jordan Based on TAM Model
YK Shaheen, AM Elian, RF Ibrahim, M Al Dalain
2021 12th International Conference on Information and Communication Systems …, 2021
12021
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
I Aldmour, R Budiarto, P Peris-Lopez
12014
Vulnerability Analysis of PAP for RFID Tags
M Naser, P Peris-Lopez, M Rafie, J van der Lubbe
arXiv preprint arXiv:1008.3625, 2010
12010
Android Spyware Detection Using Machine Learning: A Novel Dataset
MK Qabalin, M Naser, M Alkasassbeh
Sensors 22 (15), 5765, 2022
2022
New Block Cipher Encryption Based On OTP Algorithm
J Al-Nemri, M Naser
2022 International Conference on Engineering & MIS (ICEMIS), 1-6, 2022
2022
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights
ZK Al-Enizi, M Naser
International Journal of Cyber Warfare and Terrorism (IJCWT) 12 (1), 1-10, 2022
2022
GPS Week Number Rollover Timestamp Complement
MK Qabalin, M Naser, WM Hawajreh, S Abu-Zaideh
Sensors 21 (23), 7826, 2021
2021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20