Mohammed Samaka
YOU?
Author Swipe
View article: SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach Open
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of wat…
View article: Security Services Using Blockchains: A State of the Art Survey
Security Services Using Blockchains: A State of the Art Survey Open
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these…
View article: Exploring microservices for enhancing internet QoS
Exploring microservices for enhancing internet QoS Open
With the enhancements in the field of software‐defined networking and virtualization technologies, novel networking paradigms such as network function virtualization and the Internet of Things are rapidly gaining ground. The development of…
View article: Automated Service Delivery and Optimal Placement for CRANs
Automated Service Delivery and Optimal Placement for CRANs Open
Traditionally, in cellular networks, users communicate with the base station that serves the particular cell under coverage. The main functions of a base station can be divided into two, which are the baseband unit (BBU) functionalities an…
View article: Anatomy of Scholarly Information Behavior Patterns in the Wake of Academic Social Media Platforms
Anatomy of Scholarly Information Behavior Patterns in the Wake of Academic Social Media Platforms Open
As more scholarly content is born digital or converted to a digital format, digital libraries are becoming increasingly vital to researchers seeking to leverage scholarly big data for scientific discovery. Although scholarly products are a…
View article: Anatomy of Scholarly Information Behavior Patterns in the Wake of Social Media.
Anatomy of Scholarly Information Behavior Patterns in the Wake of Social Media. Open
As more scholarly content is being born digital or digitized, digital libraries are becoming increasingly vital to researchers leveraging scholarly big data for scientific discovery. Given the abundance of scholarly products-especially in …
View article: Feasibility of Supervised Machine Learning for Cloud Security
Feasibility of Supervised Machine Learning for Cloud Security Open
Cloud computing is gaining significant attention, however, security is the biggest hurdle in its wide acceptance. Users of cloud services are under constant fear of data loss, security threats and availability issues. Recently, learning-ba…
View article: Analysis of an application delivery platform for software defined infrastructures
Analysis of an application delivery platform for software defined infrastructures Open
Application Service Providers (ASPs) obtaining resources from multiple clouds\nhave to contend with different management and control platforms employed by the\ncloud service providers (CSPs) and network service providers (NSP).\nDistributi…
View article: Blended Learning in Higher Education
Blended Learning in Higher Education Open
In the article, the author defines the possibility of integrating modern learning technologies in the conditions of digitalization of higher education. Blended learning in the preparation of university students includes a combination of mo…