Abdelshakour Abuzneid

  • Citations Per Year
Learn More
There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every(More)
Cloud computing is a dynamic computing platform that is used world-wide for computation by all the high level and low level companies like Amazon, Google etc. Cloud Computing provides the users to access their data and save it irrespective of their location. Many companies and clients rent virtual machines for running their applications and saving their(More)
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In(More)
Wireless Sensors Networks (WSN) have become vital in many areas and critical applications. Some applications require a reliable network and less maintenance, especially the power consumption. ZigBee standard shows the ability to be used for many applications that require low data transmission and low power consumption. The standard helps the overall network(More)
Image processing frameworks are focusing towards the use of computer vision techniques in human PC collaboration and feeling investigation through a space mapping between the constant feeling and an arrangement of discrete feeling classes. While accomplishing great execution, the most productive component space and characterization system for Face(More)
  • 1