- Blockchain Technology Applications and Security
- Advanced Statistical Process Monitoring
- Privacy-Preserving Technologies in Data
- Scientific Measurement and Uncertainty Evaluation
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Statistical Methods and Models
- IoT and Edge/Fog Computing
- Cybercrime and Law Enforcement Studies
Al-Kafaàt University
2020-2021
Issy Media (France)
2018
Abstract With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, others. To defend organizations' networks from existing, foreseen, future threats, intrusion detection systems (IDSs) becoming a must....
Abstract Over the past years, blockchain technology has become more and interesting since its ability to carry out transactions without any mediator. To ensure transactions' reliability, consensus algorithms are adopted by technology. However, due failure of in managing nodes' identities, is considered inappropriate for many applications. In this article, we propose permissionless proof‐of‐reputation‐X (PL‐PoRX) that upgrades an existing algorithm, (PoRX). PL‐PoRX replaces trusted identity...