Mo Adda
University of Portsmouth
H-index: 16
Europe-United Kingdom
Top articles of Mo Adda
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Comparative Analysis of Feature Eliminator Methods to Improve Machine Learning Phishing Detection | Journal of Data Science and Intelligent Systems | Jibrilla Tanimu Stavros Shiaeles Mo Adda | 2024 |
The challenges of cloud forensics | Soraya Harding Mo Adda Walid AlMashaleh | 2023/3/11 | |
Creating Air Temperature Models for High-Elevation Desert Areas Using Machine Learning | Journal of Computational Innovation and Analytics (JCIA) | Massoud Forooshani Alexander Gegov Nick Pepin Mo Adda | 2023 |
Employing blockchain technology to counter IoT digital forensics challenges | Soraya Harding Mo Adda Lorretta Dumebi Ibe | 2023/9/11 | |
HyperZ: Hyper Z-Tree Topology | Mo Isaac Adda | 2023/6/19 | |
A Formal Language for Actors’ Interactions | Mo Adda | 2023/5/24 | |
Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network | Blockchain: Research and Applications | Muntadher Sallal Gareth Owenson Dawood Salman Mo Adda | 2022/3/1 |
Are human drivers a liability or an asset? | David Sanders Malik Haddad Giles Tewkesbury Alex Gegov Mo Adda | 2022 | |
Fuzzy Control of Traffic Junctions in Undersaturated Urban Networks | Boriana Vatchova Mo Adda Yordanka Boneva Alexander Gegov | 2022/6/6 | |
Modeling air temperature in forested areas using machine learning | WSEAS Transactions on Computers | Massoud Emamy Forooshani Alexander Gegov Nick Pepin Mo Adda | 2022/6/3 |
Novel Power Management Technique for Energy Efficient Cloud System Applications using a Java Agent | Ogechukwu Okonor Mo Adda | 2022/5/9 | |
INHS Newsletter–March 2022 | Comunicar | INHS Dear W Alorainy P Burnap H Liu M Williams | 2021 |
Forensic tools for IoT device investigations in regards to human trafficking | Nancy Scheidt Mo Adda Lucas Chateau Yasin Emir Kutlu | 2021/8/13 | |
Threats in industrial IoT | Nancy Scheidt Mo Adda | 2021/4/29 | |
Application of the spectra of graphs in network forensics | Chuck Easttom Mo Adda | 2021/1/27 | |
Framework of confidence values during digital forensic investigation processes | WSEAS Transactions on Systems and Control | Nancy Scheidt Mo Adda | 2020 |
Application of extended IOWA operator for making group decision on co-owned contents in online social networks (OSNs) | Gulsum Akkuzu Benjamin Aziz Mo Adda | 2020/8/28 | |
Towards consensus-based group decision making for co-owned data sharing in online social networks | IEEE Access | Gulsum Akkuzu Benjamin Aziz Mo Adda | 2020/5/13 |
The creation of network intrusion fingerprints by graph homomorphism | WSEAS Transactions on Information Science and Applications | William Easttom Mo Adda | 2020/8/6 |
Automated detection of racial microaggressions using machine learning | Omar Ali Nancy Scheidt Alexander Gegov Ella Haig Mo Adda | 2020/12/1 |