Distributed and Reliable Leader Election Framework for Wireless Sensor Network (DRLEF) (English)
- New search for: Elsakaan, Nadim
- New search for: Amroun, Kamal
- New search for: Ragab Hassen, Hani
- New search for: Batatia, Hadj
- New search for: Elsakaan, Nadim
- New search for: Amroun, Kamal
In:
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
;
Chapter: 13
;
123-141
;
2022
- Article/Chapter (Book) / Electronic Resource
-
Title:Distributed and Reliable Leader Election Framework for Wireless Sensor Network (DRLEF)
-
Additional title:Lect. Notes in Networks, Syst.
-
Contributors:Ragab Hassen, Hani ( editor ) / Batatia, Hadj ( editor ) / Elsakaan, Nadim ( author ) / Amroun, Kamal ( author )
-
Conference:International Conference on Applied CyberSecurity ; 2021 ; Dubai, United Arab Emirates
-
Published in:Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 ; Chapter: 13 ; 123-141Lecture Notes in Networks and Systems ; 378 ; 123-141
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2022-02-02
-
Size:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Android Malware Detection Using API Calls: A Comparison of Feature Selection and Machine Learning ModelsMuzaffar, Ali / Ragab Hassen, Hani / Lones, Michael A. / Zantout, Hind et al. | 2022
- 2
-
Intrusion Detection for CAN Using Deep Learning TechniquesSuwwan, Rawan / Alkafri, Seba / Elsadek, Lotf / Afifi, Khaled / Zualkernan, Imran / Aloul, Fadi et al. | 2022
- 3
-
A Comparative Study of Machine Learning Binary Classification Methods for Botnet DetectionElsakaan, Nadim / Amroun, Kamal et al. | 2022
- 4
-
Detecting Vulnerabilities in Source Code Using Machine LearningHany, Omar / Abu-Elkheir, Mervat et al. | 2022
- 5
-
Android Malware Detection Using Long Short Term Memory Recurrent Neural NetworksGeorgieva, Lilia / Lamarque, Basile et al. | 2022
- 6
-
Vulnerability Detection Using Deep LearningElsheikh, Mahmoud Osama et al. | 2022
- 7
-
Feature Selection Approach for Phishing Detection Based on Machine LearningWei, Yi / Sekiya, Yuji et al. | 2022
- 8
-
Phishing Email Detection Using Bi-GRU-CNN ModelRemmide, Mohamed Abdelkarim / Boumahdi, Fatima / Boustia, Narhimene et al. | 2022
- 9
-
Using Physically Unclonable Function for Increasing Security of Internet of ThingsKhaje, Mohammad Taghi Fatehi / Moradi, Mona / Navi, Kivan et al. | 2022
- 10
-
Multi-face Recognition Systems Based on Deep and Machine Learning AlgorithmsAlane, Badreddine / Saad, Bouguezel et al. | 2022
- 11
-
A Novel Approach Integrating Design Thinking Techniques in Cyber Exercise DevelopmentGafic, Melisa / Tjoa, Simon / Kieseberg, Peter et al. | 2022
- 12
-
Availability in Openstack: The Bunny that Killed the CloudIsmail, Salih / Ragab Hassen, Hani / Just, Mike / Zantout, Hind et al. | 2022
- 13
-
Distributed and Reliable Leader Election Framework for Wireless Sensor Network (DRLEF)Elsakaan, Nadim / Amroun, Kamal et al. | 2022