June 2024
·
4 Reads
·
1 Citation
Egyptian Informatics Journal
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2024
·
4 Reads
·
1 Citation
Egyptian Informatics Journal
July 2023
·
6 Reads
·
12 Citations
Ain Shams Engineering Journal
January 2023
·
10 Reads
International Journal of Advanced Computer Science and Applications
... Access control is another important cybersecurity measure that limits access to the system to authorized users only. This can be achieved through passwords, biometric authentication, or other security measures (Elmenyawi et al., 2024). Intrusion detection systems can also identify and respond to potential cyber threats. ...
June 2024
Egyptian Informatics Journal
... VPNs use encrypted tunnels to route traffic, meaning network administrators cannot see what is inside the tunnel. This makes it difficult to identify whether the traffic is legitimate or illegitimate as mentioned in [11]. Malicious actors often use VPNs to hide their activities. ...
July 2023
Ain Shams Engineering Journal