IoT Security based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme

Faculty Computer Science Year: 2019
Type of Publication: ZU Hosted Pages:
Authors:
Journal: 22nd International Conference on Computer Applications & Information Security IEEE Volume:
Keywords : , Security based , Iris Verification Using Multi-Algorithm    
Abstract:
Internet of Things (IoT) have very big opportunities in businesses and life, especially Internet Banking, Healthcare and Transportation. But developers face challenges in security especially for sensitive data to use IoT safely with Interne
   
     
 
       

Author Related Publications

  • Wael Said AbdelMageed Mohamed, "A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks", Springer Nature, 2018 More
  • Wael Said AbdelMageed Mohamed, "Improving the reconstruction of dental occlusion using a reconstructed‑based identical matrix point technique", Springer Nature Switzerland AG, 2021 More
  • Wael Said AbdelMageed Mohamed, "Connection-Adjustable Network Slicing Process for Heterogeneous Service Handling in Real-Time Applications", American Scientific Publishers, 2022 More
  • Wael Said AbdelMageed Mohamed, "Space Division Multiple Access for Cellular V2X Communications", Tech Science Press, 2022 More
  • Wael Said AbdelMageed Mohamed, "A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications", Tech Science Press, 2021 More

Department Related Publications

  • Hosam Rada mohamed abdel megeed hawash, "Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System", IEEE, 2022 More
  • Hosam Rada mohamed abdel megeed hawash, "Explainability of artificial intelligence methods, applications and challenges: A comprehensive survey", Elsevier Inc, 2022 More
  • Hosam Rada mohamed abdel megeed hawash, "STLF-Net: Two-stream deep network for short-term load forecasting in residential buildings", Elsevier, 2022 More
  • Mustafa Khamis Baz Ramadan, "An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making", An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making, 2017 More
  • Ibrahiem Mahmoud Mohamed Elhenawy, "Applying apache spark on streaming big data for health status prediction", TECH SCIENCE PRESS, 2022 More
Tweet