Abdelshakour Abuzneid

Learn More
Image processing frameworks are focusing towards the use of computer vision techniques in human PC collaboration and feeling investigation through a space mapping between the constant feeling and an arrangement of discrete feeling classes. While accomplishing great execution, the most productive component space and characterization system for Face(More)
There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every(More)
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In(More)
  • 1