Skip to main content

and
  1. Article

    Open Access

    The macroscopic limit to synchronization of cellular clocks in single cells of Neurospora crassa

    We determined the macroscopic limit for phase synchronization of cellular clocks in an artificial tissue created by a “big chamber” microfluidic device to be about 150,000 cells or less. The dimensions of the ...

    Jia Hwei Cheong, **ao Qiu, Yang Liu, Ahmad Al-Omari, James Griffith in Scientific Reports (2022)

  2. No Access

    Article

    Existence and continuous dependence of mild solutions for impulsive fractional integrodifferential equations in Banach spaces

    In the present paper, we investigate the existence, uniqueness, and continuous dependence of mild solutions of impulsive neutral integrodifferential equations with nonlocal conditions in Banach spaces. We use ...

    Safwan Al-Shara, Ahmad Al-Omari in Computational and Applied Mathematics (2020)

  3. Chapter

    Erratum

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  4. No Access

    Chapter

    Mobile Forensics

    This chapter covers the forensic process with mobile devices. The forensics will explore the call history, mobile browser, and types of devices. The exercises will focus on the operating systems, device states...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  5. No Access

    Chapter

    Web and Database Security

    Security in web applications is the most important concern when it comes to processing transactions in the web. One of the major issues is the security and privacy of data and information transferred, stored a...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  6. No Access

    Chapter

    Web Forensics-Chapter Competencies

    This chapter covers web forensic procedures commonly used by digital forensics professionals. The focus of the is on email communications, web browsing, and archived transmissions. The chapter explores the p...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  7. No Access

    Chapter

    Network Security

    Providing appropriate protection techniques is significant to combat cyber-threats and preserve the integrity, confidentiality and availability of computer networks. The increasing volume of malicious cyber-at...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  8. No Access

    Chapter

    Network Forensics: Lesson Plans

    A forensic investigator who is analyzing computer equipment for possible evidences, will search different locations for possible traces. We described in other chapters the types of evidences that can be found ...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  9. No Access

    Chapter

    Introduction to Information Security

    Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical ass...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  10. No Access

    Chapter

    Security and Access Controls: Lesson Plans

    Access controls are considered as important security mechanisms. They usually target (authenticated users: Those users who can legally access subject information system or resource). This indicates that they t...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  11. No Access

    Chapter

    Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans

    Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  12. No Access

    Chapter

    Software Code Security: Lesson Plans

    In information systems, software programs are major components that exist to implement services/functions. They integrate hardware, network and environment to provide services for users that can vary based on ...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  13. No Access

    Chapter

    Disk and Computer Forensics: Lesson Plans

    In , many software and hardware components can be searched for possible relevant evidences. Digital forensic investigators should not only have knowledge on the subject case, but also on technical skills rela...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  14. No Access

    Chapter

    The Ontology of Malwares

    Absolute security is almost impossible. On a daily basis the security of many systems is compromised. Attackers utilize different techniques to threaten systems’ security. Among different threats to systems’ s...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  15. No Access

    Chapter

    Security and Risk Management and Planning: Lesson Plans

    This chapter covers risk management and planning associated with information security. The focus is on incident responses, disaster recovery, and business continuity. The chapter explains risks, strategies, co...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  16. No Access

    Chapter

    Mobile and Wireless Security: Lesson Plans

    Mobile and wireless by humans continue to grow rapidly in the last few years. Number of subscribers to mobile service provides exceed the number of human population (As in many cases, users carry more tha...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  17. Article

    Open Access

    Synchronizing stochastic circadian oscillators in single cells of Neurospora crassa

    The synchronization of stochastic coupled oscillators is a central problem in physics and an emerging problem in biology, particularly in the context of circadian rhythms. Most measurements on the biological c...

    Zhaojie Deng, Sam Arsenault, Cristian Caranica, James Griffith in Scientific Reports (2016)

  18. No Access

    Article

    A unified theory of contra-(μ,λ)-continuous functions in generalized topological spaces

    We introduce a new notion called contra-(μ,λ)-continuous functions as functions on generalized topological spaces [8]. We obtain some characterizations and several properties of such functions. The functions enab...

    Ahmad Al-Omari, Takashi Noiri in Acta Mathematica Hungarica (2012)

  19. No Access

    Article

    A unified theory of generalized closed sets in weak structures

    A new kind of sets called generalized w-closed (briefly gw-closed) sets is introduced and studied in a topological space by using the concept of weak structures introduced by Á. Császár in [6]. The class of all g...

    Ahmad Al-Omari, Takashi Noiri in Acta Mathematica Hungarica (2012)