Skip to main content
User Image

محمد بن إبراهيم بن صالح المعتاز

Demonstrator

عضو هيئة تدريس

علوم الحاسب والمعلومات
كلية علوم الحاسب والمعلومات - قسم علوم الحاسب

introduction/brief CV

publications
see all

publications

A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of…

by Muhammad Al-Mutaz, Levi Malott, Sriram Chellappan
2014
publications

​A Sybil attack is one where an adversary assumes multiple identities with the purpose of defeating the trust of an existing reputation system. When Sybil attacks are launched in vehicular…

by Muhammad AlMutaz, Levi Malott, Sriram Chellappan
2013

courses
see all

course

The common shell features, including I/O redirection, piping, command substitutions and job control, process, program, process groups, signals, running programs, address space, user and kernel…

course

Introduction to computers, Simple types, variables and statements, Input output statements, Conditional statements, Iteration statements, Functions and procedures, Recursion, One-dimensional array…