http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
ALRUWAILI, Anfal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.8
Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.
Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor
ALRUWAILI, Amal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.9
In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.
Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks
Alruwaili, Rahaf Hamoud,Alanazi, Haifa Khaled,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.10
Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.
False-Positive Gallium-68 DOTATATE PET/CT in Vertebral Hemangioma
Ahmed Abdulrahman Alruwaili,Alaa Khalid Alduraibi,Alzayed Mohammed Fahed 대한핵의학회 2021 핵의학 분자영상 Vol.55 No.2
A healthy 52-year-old man started to have few minutes spells of palpitation, tachycardia, hot flashes, and chest tightness. He had a lab work-up for carcinoid, including 5-hydroxyindoleacetic acid (5-HIAA), which was negative. Months later, his symptoms became worse which warranted further investigation to exclude carcinoid disease. Gallium-68 DOTATATE positron emission tomography combined with computed tomography (PET/CT) scanning was performed to assess the patient for carcinoid tumor. It showed foci of radiotracer avidity in the thoracic and lumber spine. Magnetic resonance imaging (MRI) for the vertebral lesions showed atypical hemangioma. Subsequently, follow-up serum chromogranin A testing was negative.
Using SQLMAP to Detect SQLI Vulnerabilities
Almadhy, Waad,Alruwaili, Amal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.1
One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.
Cyber Security Attacks and Challenges in Saudi Arabia during COVID-19
Nourah Almrezeq,Mamoona Humayun,Madallah Alruwaili,Saad Alanazi,NZ Jhanjhi International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.10
The outbreak of COVID-19 had affected almost every part of the world and caused disastrous results, the number of reported COVID-19 cases in past few months have reached to more than 29 million patients in the world globally. This pandemic has adversely affected all the activities of life, ranging from personal life to overall economic development. Due to the current situation, routinely turned to online resources, and people have relied on technology more than they have been before. Since cybercriminals are an opportunist and they utilized this entirely, by targeting the online services for all sectors of life. This fortnight online dependency of the community over the internet opened several easy doors for the cybercriminals. This causes exponential attacks over internet traffic during this epidemic situation. The current Covid-19 pandemic situation appeared at once, and no one was ready to prevail this. However, there is an urgent need to address the current problem in all means. . KSA is among one of the countries most affected by these CA and is a key victim for most cyber-crimes. Therefore, this paper will review the effects of COVID-19 on the cyber-world of KSA in various sectors. We will also shed light on the Saudi efforts to confront these attacks during COVID -19. As a contribution, we have provided a comprehensive framework for mitigating cybersecurity challenges.