Energy thefts are one of the critical attacks that often cause high revenue losses for utility companies around the world. Effective detection of such attacks is very important and must be…
Data driven approaches have been widely employed in recent years to detect electricity thefts. Although many techniques have been proposed in the literature, they mainly focus on electricity…
As the use of Wireless Sensor Networks grows, many challenging issues with these networks arise. The utilization of power consumption is one of the most significant issue due to the limited energy…
This course introduces security issues in various aspects of computing, particularly security fundamentals, security in programs, operating systems, networks, databases, and Internet applications…
This course covers: definition of computer networks and their objectives and applications. Computer network architecture: layering, protocols and standard models, the ISO OSI and TCP/IP reference…
The objective of the course is to give to the student the basis for developing visual applications. Using a carefully selected visual programming language, the following topics are studied: OO…