Hashem Alaidaros

ORCID: 0009-0008-8585-2232
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Information and Cyber Security
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Advanced Data Storage Technologies
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Coding theory and cryptography
  • Algorithms and Data Compression
  • Retinal Imaging and Analysis
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Traffic control and management
  • Cooperative Communication and Network Coding
  • Legal and Policy Issues
  • Network Packet Processing and Optimization
  • Cloud Data Security Solutions
  • Advanced Image Fusion Techniques
  • Digital Transformation in Industry
  • Remote-Sensing Image Classification

Dar Al-Hekma University
2022-2024

Northern University of Malaysia
2016-2017

Universiti Putra Malaysia
2007

The Internet of Things (IoT) aims to efficiently connect various entities, including humans, machines, smart devices, physical environments, and others, so they can communicate exchange data in real time. However, due the massive amount transferred, presence devices with limited resources, heterogeneity, mobility support would make it difficult create a robust network respect performance an IoT context. In order disseminate enormous volume automated data, Named Data Networking (NDN), viable...

10.1109/access.2023.3276713 article EN cc-by-nc-nd IEEE Access 2023-01-01

The development of the Internet Vehicles (IoV) has been made possible through a variety communication technologies and advanced AI techniques. In this context, ensuring stable efficient for IoV is extremely important. It addresses several challenges related to security issues, high dynamism, constant connection outages, expected traffic density. To overcome these challenges, vehicle clustering viable strategy reliable environment. majority current research focuses on solving problem cluster...

10.1016/j.jksuci.2023.101867 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-12-01

Information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-offs made between security performance demands further research toward improvement. In bulk data transfer, especially in large messages, secured processing time takes much longer than non-secured processes. This crypto operations, which include symmetric encryption operations hashing...

10.1109/ictmicc.2007.4448620 article EN 2007-01-01

The metaverse, which is considered to be the next evolutionary stage of Internet, has captured attention both academia and industry. Its primary goal establish a shared 3D virtual space that interconnects all worlds through Internet. In this space, users are represented as digital avatars, enabling them communicate, interact with each other, engage environment if they were in physical world. However, realizing full potential metaverse poses significant challenges, such requirement for higher...

10.3991/ijim.v18i14.47269 article EN International Journal of Interactive Mobile Technologies (iJIM) 2024-08-02

Cybersecurity is becoming of increasing importance, as the use cyberspace growing, and security challenges facing it are rising. The purpose this paper to develop a new cybersecurity assessment framework that provides quantitative measurement state private networks organizations consequently enables its future improvement. based on considering five domains network protection controls one hand, implementation these other. On base, identifies their recent version ISO 27002:2022, other...

10.1109/cicn56167.2022.10008317 article EN 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN) 2022-12-04

Background and Objective: Inspecting all packets to detect intrusions faces challenges when coping with a high volume of traffic.Packet-based detection processes every payload on the wire, which degrades performance intrusion-detection systems.This issue requires introduction flow-based IDS approach that reduces amount data be processed by examining aggregated information related in form flow.However, still suffers from generation false positive alerts due lack completed input.This study...

10.3923/rjit.2016.55.65 article EN Research Journal of Information Technology 2016-03-01
Coming Soon ...