-
1
Maternal secure base support and preschoolers' secure base behavior in natural environments
Published 2007“…Overall, findings indicated that maternal secure base support was significantly related to the organization of child secure base behavior (r = .31 and .49 for Study 1 and Study 2, respectively). …”
Get full text
Get full text
Get full text
article -
2
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. …”
-
3
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. …”
Get full text
Get full text
Get full text
article -
4
Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications
Published 2024“…Our results reveal the significant impact of atmospheric turbulence, RF fading, pointing errors, and optical detection technologies on the overall secrecy performance, providing valuable insights for designing secure mixed FSO and RF downlink communication systems.…”
-
5
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
6
Degree-Based Network Anonymization
Published 2020“…The consequent privacy and data security concerns have motivated the work on degree-based data anonymization. …”
Get full text
Get full text
Get full text
masterThesis -
7
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. …”
-
8
-
9
-
10
Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events
Published 2023“…This study also confirmed the validity and reliability of the newly developed scales, offering practical and proposed implications for the IT and security industries. The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…”
-
11
Consortium Blockchain-Based Decentralized Stock Exchange Platform
Published 2020“…In this paper, we present a novel blockchain-based architecture for a fully decentralized stock market. …”
-
12
Secure Uplink IM-OFDMA With Artificial IQ Imbalance
Published 2023“…<p dir="ltr">This study proposes a novel secure uplink index modulation-based orthogonal frequency division multiple access (IM-OFDMA) systems using artificial in-phase and quadrature imbalance (A-IQI). …”
-
13
Formal Verification of a Security Protocol in Vehicular Communication
Published 2025Get full text
doctoralThesis -
14
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …”
-
15
Security Assessment of Low-Resource Edge Devices for IoT Systems
Published 2020Get full text
doctoralThesis -
16
Competition vs cooperation: An agent based model for sustainable tomatoes’ import system
Published 2024“…Interactions between trade partners are modeled using two game theoretic approaches counting<u> Cournot</u><u> competition</u> and <u>Cartel</u> collusion. Based on the research findings, a competitive global market can bring economic benefits to Qatar as an importing nation, but this approach also entails substantial <u>water consumption</u> and results in significant environmental emissions. …”
-
17
-
18
An Energy-Water-Food Nexus-based Decision-making Framework to Guide National Priorities in Qatar
Published 2021“…The water system has also displayed a low security level, represented by a high criticality score of 0.14 in comparison with the food and energy sectors. …”
-
19
Transforming Towards Secure Global Trade for Customs Administrations Powered by Blockchain
Published 2020“…The trade supply chain involves several participants each performs its task based on the documents that are provided by the other participant in the trade supply chain. …”
Get full text
-
20
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”