[PDF][PDF] Current 5g federation trends: A literature review

A Fox, HA Kholidy, I Almazyad - 2023 - easychair.org
5G is the latest generation of mobile networks, developed with the purpose of faster
communication, more spectrum use, and lower latency. With 5G in such high demand, the …

Towards a scalable symmetric key cryptographic scheme: Performance evaluation and security analysis

HA Kholidy - 2019 2nd International Conference on Computer …, 2019 - ieeexplore.ieee.org
In most applications, security attributes are pretty difficult to meet but it becomes even a
bigger challenge when talking about Grid Computing. To secure data passes in Grid …

Accelerating stream cipher operations using single and grid systems

HAEIM Kholidy - US Patent 8,533,456, 2013 - Google Patents
Systems and methods for accelerating stream cipher encryp tion operations are described.
In one aspect, a computer implemented method receives data. The method separates the …

SIoTSim: Simulator for Social Internet of Things

MC Zouzou, M Shahawy, E Benkhelifa… - … on Internet of Things …, 2023 - ieeexplore.ieee.org
The Social Internet of Things (SIoT) concept extends beyond the Internet of Things (IoT) by
integrating principles from social networking to form interconnected networks of intelligent …

A New Accelerated RC4 Scheme Using “Ultra Gridsec” and “HIMAN” and use this Scheme to Secure “HIMAN” Data

HA Kholidy, KS Alghathbar - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
In most applications, security attributes are pretty difficult to meet but security becomes even
a bigger challenge when talking about grid computing. Providing secure communication …

[PDF][PDF] Network Security Concerns in 5G MIMO Beamforming

MA Ismail - EasyChair Preprint, 2023 - easychair.org
MIMO technology is a key technology of 5G, which is widely used in next-generation
scenarios such as heterogeneous networks, millimeter-wave networks, and automotive …

Leveraging SDN for Real World Windfarm Process Automation Architectures

S Hamadache, E Benkhelifa, H Kholidy… - … on Software Defined …, 2023 - ieeexplore.ieee.org
SCADA systems are the main part of automated controls and supervision in industrial control
systems (ICS). Current SCADA systems are installed in sophisticated, complex architectures …

[PDF][PDF] Identity Theft and Best Practices to Protect Against It

MA Ismail - EasyChair Preprint, 2023 - easychair.org
Identity theft is one of the fastest-growing crimes in the world and the US. An unauthorized
person who knows your Social Security number could use it to obtain other personal …

Evaluating Machine Learning Classifier Approaches, and their Accuracy for the Detection of Cyberattacks on 5G IoT Systems

A Rosic - arXiv preprint arXiv:2311.02317, 2023 - arxiv.org
As 5G continues to expand its coverage and use. Innovative ideas/technologies continue to
be implemented within. New vulnerabilities appear, thus resulting in new methods of …

HIMAN-GP: A Grid Engine Portal for controlling access to HIMAN Grid Middleware with performance evaluation using processes algebra

HA Kholidy - 2010 2nd International Conference on Computer …, 2010 - ieeexplore.ieee.org
Grid portal is a secure web environment where user can monitor and execute grid
applications, access grid resources, services, and collaborate with other users. A grid portal …