Osman Ghazali

According to our database1, Osman Ghazali authored at least 22 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Academic Certificate Privacy with a Hyperledger Fabric Blockchain-Based Access Control Approach.
SN Comput. Sci., September, 2023

2021
A New Decentralized Certification Verification Privacy Control Protocol.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications.
Int. J. Commun. Networks Inf. Secur., 2020

2019
Cloud-Based Global Online Marketplaces Review on Trust and Security.
Int. J. Interact. Mob. Technol., 2019

Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges.
Int. J. Interact. Mob. Technol., 2019

Detection algorithm for internet worms scanning that used user datagram protocol.
Int. J. Inf. Comput. Secur., 2019

2018
Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions.
IEEE Commun. Surv. Tutorials, 2018

2013
A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network.
J. Netw. Comput. Appl., 2013

Information Needs of Rural Communities.
J. Community Informatics, 2013

The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET.
Int. J. Mob. Comput. Multim. Commun., 2013

Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing.
Int. J. Mob. Comput. Multim. Commun., 2013

2012
Enhanced skin colour classifier using RGB Ratio model
CoRR, 2012

Trust Management in Cloud Computing: A Critical Review
CoRR, 2012

Redirect Link Failure Protocol Based on Dynamic Source Routing for MANET.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

A Memoryless Trust Computing Mechanism for Cloud Computing.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2011
A trust computing mechanism for cloud computing.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

Applying Bees Algorithm for Trust Management in Cloud Computing.
Proceedings of the Bio-Inspired Models of Networks, Information, and Computing Systems, 2011

Modeling of cloud system using Erlang formulas.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
Survey on the Event Orderings Semantics Used for Distributed System
CoRR, 2010

2009
A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms.
Int. J. Commun. Networks Inf. Secur., 2009

Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet.
Proceedings of the First International Conference on Networks and Communications, 2009

Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server.
Proceedings of the 2009 International Conference on Security & Management, 2009


  Loading...