RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • DLDW: Deep Learning and Dynamic Weighing-based Method for Predicting COVID-19 Cases in Saudi Arabia

        Albeshri, Aiiad International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.9

        Multiple waves of COVID-19 highlighted one crucial aspect of this pandemic worldwide that factors affecting the spread of COVID-19 infection are evolving based on various regional and local practices and events. The introduction of vaccines since early 2021 is expected to significantly control and reduce the cases. However, virus mutations and its new variant has challenged these expectations. Several countries, which contained the COVID-19 pandemic successfully in the first wave, failed to repeat the same in the second and third waves. This work focuses on COVID-19 pandemic control and management in Saudi Arabia. This work aims to predict new cases using deep learning using various important factors. The proposed method is called Deep Learning and Dynamic Weighing-based (DLDW) COVID-19 cases prediction method. Special consideration has been given to the evolving factors that are responsible for recent surges in the pandemic. For this purpose, two weights are assigned to data instance which are based on feature importance and dynamic weight-based time. Older data is given fewer weights and vice-versa. Feature selection identifies the factors affecting the rate of new cases evolved over the period. The DLDW method produced 80.39% prediction accuracy, 6.54%, 9.15%, and 7.19% higher than the three other classifiers, Deep learning (DL), Random Forest (RF), and Gradient Boosting Machine (GBM). Further in Saudi Arabia, our study implicitly concluded that lockdowns, vaccination, and self-aware restricted mobility of residents are effective tools in controlling and managing the COVID-19 pandemic.

      • SCIESCOPUS

        Security Completeness Problem in Wireless Sensor Networks

        Shaikh, Riaz Ahmed,Lee, Sungyoung,Albeshri, Aiiad AUTOSOFT PRESS 2015 INTELLIGENT AUTOMATION AND SOFT COMPUTING Vol.21 No.2

        <P>With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integration of all these three aspects in a single solution for resource constraints wireless sensor networks is not trivial. Current research intensively focuses on all these three aspects in an isolated manner. To the best of our knowledge, we have not found any work in the literature that comprehensively discusses: how these various privacy, security and trust solutions work together? In this work, we have made the first step towards this direction and to show how integration of various privacy, security and trust solutions can be performed in a single solution in step-by-step manner.</P>

      • KCI등재

        An Untraceable ECC-Based Remote User Authentication Scheme

        ( Zahid Mehmood ),( Gongliang Chen ),( Jianhua Li ),( Aiiad Albeshri ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.3

        Recent evolution in the open access internet technology demands that the identifying information of a user must be protected. Authentication is a prerequisite to ensure the protection of user identification. To improve Qu et al.`s scheme for remote user authentication, a recent proposal has been published by Huang et al., which presents a key agreement protocol in combination with ECC. It has been claimed that Huang et al. proposal is more robust and provides improved security. However, in the light of our experiment, it has been observed that Huang et al.`s proposal is breakable in case of user impersonation. Moreover, this paper presents an improved scheme to overcome the limitations of Huang et al.`s scheme. Security of the proposed scheme is evaluated using the well-known random oracle model. In comparison with Huang et al.`s protocol, the proposed scheme is lightweight with improved security.

      • KCI등재

        Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

        ( Azeem Irshad ),( Muhammad Sher ),( Bander A. Alzahrani ),( Aiiad Albeshri ),( Shehzad Ashraf Chaudhry ),( Saru Kumari ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.1

        The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.’s scheme demonstrated that Mishra et al.’s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.’s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.’s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼