UB ScholarWorks

Browsing Engineering Posters by Author "Abuzneid, Abdelshakour A."

Browsing Engineering Posters by Author "Abuzneid, Abdelshakour A."

Sort by: Order: Results:

  • Nomula, Neha; Anusha, Komareddy; Panuganti, Neha; Chitumadugula, Niharika; Pusapati, Satya Sai Charan; Ranganthan, Srividya (2017-03-24)
    This work is related to providing security using authentication. By looking into other research works, we have found many attacks while logging in a system like phishing attack, brute force attack, etc. We came up with a ...
  • Khan, Muhammad Bahauddin; Prashanth, Nitish Makam; Nomula, Neha; Pathak, Prachi; Muralidhar, Ajay Menon (2017-03-24)
    The aim of this project is to eliminate the paper-based attendance with auto attendance by using student ID card. Currently, there is a card based attendance used in companies and web based attendance is used in the ...
  • Ajith Prasad, Meghana; Jagannath, Namrata; Doddabyadarahhali-Shivalingu, Sumantha (2017-03-24)
    Securing personal data in the public spaces is something to worry about, in particular, the privacy and the confidentiality. The Internet of Things (IoT) will be widespread all over the network to connect devices and the ...
  • Abuzneid, Abdelshakour A.; Gudipati, Vamshi Krishna; Kumar, Varun; Vetwal, Aayush; Adeniyi, Anjorin (2015-03-27)
    Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics. ...
  • Abuzneid, Abdelshakour A. (2017-03-24)
    In WSN applications, data privacy itself, might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient ...
  • Muralidhar, Ajay Menon; Khan, Muhammad Bahauddin; Prashanth, Nitish Makam; Nomula, Neha; Pathak, Prachi (2017-03-24)
    This work is used to bridge the gap between consumer and oil supplier by building a smart monitoring system with the help of  ESP8266 (Wi-Fi module) and  Alexa (Intelligent AI based Virtual Assistant). In the existing ...
  • Abdulhammed, Razan; Musafer, Hassan; Alessa, Ali; Faezipour, Miad; Abuzneid, Abdelshakour A. (2018-03-23)
    In cybersecurity, machine/deep learning approaches can predict and detect threats before they result in major security incidents. The design and performance of an effective machine learning (ML) based Intrusion Detection ...
  • Fazulullah, Abul Hasan; Patel, Kartavi; Patel, Dipesh; Vansia, Purva (2017-03-24)
    With emerging technology and support for 4G and 5G network, considering Internet and Intranet, the bandwidth is not a big of a problem as it was before. The main concern now is the implementation of security and how ...
  • Kadiyala, Sai Teja; Sowdhari, Anusha; Valina, Sowmya; Pandhaloor, Sajeesh; Osula, Harrison (2017-03-24)
    Advancements in wireless sensor technology have led to increasing the involvement of Wireless Sensors Network (WSN) in health care domain. This paper analyzes the security issues and finds the possible techniques to minimize ...
  • Bushnag, Anas; Abuzneid, Abdelshakour A. (2017-03-24)
    Many of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring endangered species, and/or military applications in areas of interest require anonymity of the origin known as Source Location Privacy ...

Search ScholarWorks


Advanced Search

Browse

My Account