A Study of Android Security Vulnerabilities and Their Future Prospects
Alsumayt, Albandari, Elbeh, Heba, Elkawkagy, Mohamed, Alfawaer, Zeyad, Alghamedy, Fatemah H., Alshammari, Majid, Aljameel, Sumayh S., Albassam, Sarah, AlGhareeb, Shahad, Alamoudi, Khadijah
Published in HighTech and innovation journal (01.09.2024)
Published in HighTech and innovation journal (01.09.2024)
Get full text
Journal Article
Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT)
Alsumayt, Albandari, Alshammari, Majid, Alfawaer, Zeyad M, Al-Wesabi, Fahd N, El-Haggar, Nahla, Aljameel, Sumayh S, Albassam, Sarah, AlGhareeb, Shahad, Alghamdi, Nouf Mohammed, Aldossary, Nawir
Published in PeerJ. Computer science (28.06.2024)
Published in PeerJ. Computer science (28.06.2024)
Get full text
Journal Article
Efficient security level in wireless sensor networks
Alsumayt, Albandari, Alshammari, Majid, Alfawaer, Zeyad M, Al-Wesabi, Fahd N, El-Haggar, Nahla, Aljameel, Sumayh S, Albassam, Sarah, AlGhareeb, Shahad, Alghamdi, Nouf Mohammed, Aldossary, Nawir
Published in PeerJ. Computer science (28.06.2024)
Published in PeerJ. Computer science (28.06.2024)
Get full text
Journal Article