Ahmad, Samer
46  Ergebnisse:
Personensuche X
?
1

Article 45 of the eIDAS Directive Unveils the need to imple..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
2

Authenticating HTTPS Connection without Relying on Certific..:

, In: 2024 15th Annual Undergraduate Research Conference on Applied Computing (URC),
 
?
3

Enhancing Secure Deployment with Ansible: A Focus on Least ..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
4

Enhancing the ACME Protocol to Automate the Management of A..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
5

Implementing the Principle of Least Privilege Using Linux C..:

, In: 2023 7th Cyber Security in Networking Conference (CSNet),
 
?
6

RootAsRole: Towards a Secure Alternative to sudo/su Command..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
7

Should We Rush to Implement Password-less Single Factor FID..:

, In: 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC),
 
?
8

Logic-based methodology to help security architects in elic..:

, In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing,
 
?
9

Applying a requirement engineering based approach to evalua..:

, In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing,
 
?
10

Which Security Requirements Engineering Methodology Should ..:

, In: Proceedings of the 12th International Conference on Availability, Reliability and Security,
 
?
11

Which Web Browsers Process SSL Certificates in a Standardiz..:

, In: Emerging Challenges for Security, Privacy and Trust; IFIP Advances in Information and Communication Technology,
 
?
12

Authentication in Virtual Organizations: A Reputation Based..:

, In: Communications in Computer and Information Science; Systems and Virtualization Management. Standards and New Technologies,
 
?
13

Educational Starting Board for Three-Phase Squirrel Cage In..:

, In: Intelligent Systems, Business, and Innovation Research; Studies in Systems, Decision and Control,
Kitaneh, Ali ; Jarrad, Ahmad ; Alsadi, Samer... - p. 669-680 , 2024
 
?
14

The Impact of Information Sharing and Delivery Time on Cust..:

, In: Studies in Big Data; Cyber Security Impact on Digitalization and Business Intelligence,
 
?
15

The Impact of Demand Forecasting on Effective Supply Chain ..:

, In: Studies in Big Data; Cyber Security Impact on Digitalization and Business Intelligence,
 
1-15