Follow
Islam Abdalla Mohamed Abass
Islam Abdalla Mohamed Abass
jouf univeristy
Verified email at ju.edu.sa
Title
Cited by
Cited by
Year
Social Engineering Threat and Defense: A Literature Survey
IAM Abass
Journal of Information Security 9 (04), 257, 2018
632018
Classification For Iot Threats Based On The Analytic Hierarchy Process
IA Mohamed, AB Aissa, LF Hussein
62020
A Novel Stochastic Model For Cybersecurity Metric Inspired By Markov Chain Model And Attack Graphs
AB Aissa
62020
Development of a Secured Vehicle Spot Detection System Using GSM.
LF Hussein, AB Aissa, IA Mohamed, S Alruwaili, A Alanzi
International Journal of Interactive Mobile Technologies 15 (4), 2021
42021
New Textual Authentication Method to Resistant Shoulder-Surfing Attack
ABA Islam Abdalla Mohamed,Loay FHussein,Tarak kallel
International Journal of Advanced Computer Science and Applications 13 (1), 2022
22022
A comprehensive cost performance analysis for a QoS-based scheme in network mobility (NEMO)
LF Hussein, IAM Abass, AB Aissa, AHA Hashim, AA Alzahrani, ...
Alexandria Engineering Journal 76, 349-360, 2023
12023
Scalability Analysis of Cost Essence for a HA entity in Diff-FH NEMO Scheme
LF Hussein, IAM Abass, AB Aissa
International journal of computer science and network security: IJCSNS 22 (3 …, 2022
12022
Unveiling a Website Development for Car Inquiry
MHAR Loay F. Hussein, Islam Abdalla Mohamed Abass, Anis Ben Aissa
Ijcsns) International journal of computer science and network security 23 (2 …, 2023
2023
Secure Data Sharing in The Cloud Through Enhanced RSA
T Islam abdalla mohamed, Loay F.Hussein, Anis Ben Aissa
(Ijcsns) International journal of computer science and network security 23 …, 2023
2023
Optical properties of LiNbO3 crystals doped with Yb3+ ions
T Kallel, M Yahyaoui, S Amdouni, R Fakhfakh, AB Aissa, IM Abdallah, ...
Opt Laser Technol 32, 724-729, 2021
2021
EXPERIMENTAL ANALYSIS OF DOCUMENT VERIFICATION SCHEME USING BLOCKCHAIN LOGICS OVER SECURED CLOUD ENVIRONMENT
RM Abd El-Aziz, AB Aissa, AI Taloba, IA Mohamed
2020
DETECT SQL INJECTION VULNERABILITY AND BYPASS FILTRATION
IAM ABASS
http://repository.neelain.edu.sd:8080/xmlui;/handle/123456789/2826?show=full, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–12