Данные - 004.6

Научные статьи

В разделе "Данные"
Communication Challenges for Distributed Teams
Muhammad Asad Bin Khalid, Asim Farooq, Waqas Mahmood
Sentiment Analysis of Amazon Product Reviews Using Hybrid Rule-based Approach
Anjali Dadhich, Blessy Thankachan
Reduction of Multiple Move Method Suggestions Using Total Call-Frequencies of Distinct Entities
Atish Kumar Dipongkor, Rayhanul Islam, Nadia Nahar, Iftekhar Ahmed, Kishan Kumar Ganguly, S.M. Arif Raian, Abdus Satter
Client Server iOS in Player versus Player (PVP) of “Borneo Snap”
Reza Andrea, Tommy Bustomi, Muhammad Muhsan
Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner
Muhammad Noman Khalid, Muhammad Iqbal, Kamran Rasheed, Malik Muneeb Abid
Investigation of Different Machine Learning Algorithms to Determine Human Sentiment Using Twitter Data
Golam Mostafa, Ikhtiar Ahmed, Masum Shah Junayed
A Survey Based Study on Fog Computing Awareness
Zainab Javed, Waqas Mahmood
The Empirical Comparison of the Supervised Classifiers Performances in Implementing a Recommender System using Various Computational Platforms
Ali Mohammad Mohammadi, Mahmood Fathy
A Flow-Based Technique to Detect Network Intrusions Using Support Vector Regression (SVR) over Some Distinguished Graph Features
Yaser Ghaderipour, Hamed Dinari
Data Security in Mobile Cloud Computing: A State of the Art Review
Rida Qayyum, Hina Ejaz
Influencing Children: Limitations of the Computer-Human-Interactive Persuasive Systems in Developing Societies
Odji Ebenezer
A Bayesian Belief Network Model For Detecting Multi-stage Attacks With Malicious IP Addresses
Alile S.O., Egwali A.O.
A Metric for Evaluating Security Models based on Implementation of Public Key Infrastructure
Sigsbert Rwiza, Mussa Kissaka, Kosmas Kapis
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach
Nagesh Shenoy H., K. R. Anil Kumar, Suchitra N. Shenoy, Abhishek S. Rao, Rajgopal K.T.
A Methodology for Reliable Code Plagiarism Detection Using Complete and Language Agnostic Code Clone Classification
Sanjay B. Ankali, Latha Parthiban
Implementation of Convolutional Neural Network to Classification Gender based on Fingerprint
Ahmad Ilham Gustisyaf, Ardiles Sinaga
A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC
Pratik Gupta, Manoj Kumar
Credibility Detection on Twitter News Using Machine Learning Approach
Marina Azer, Mohamed Taha, Hala H. Zayed, Mahmoud Gadallah
Comparing Performance of Supervised Learning Classifiers by Tuning the Hyperparameter on Face Recognition
M. Ilham Rizqyawan, Ulfah Nadiya, Aris Munandar, Jony Winaryo Wibowo, Oka Mahendra, Irfan Asfy Fakhry Anto, Rian Putra Pratama, Muhammad Arifin, Hanif Fakhrurroja
Bug Severity Prediction using Keywords in Imbalanced Learning Environment
Jayalath Ekanayake
Web Performance Analysis: An Empirical Analysis of E-Commerce Sites in Bangladesh
Md. Tutul Hossain, Rakib Hassan, Mahfida Amjad, Md. Abdur Rahman
Boosting Afaan Oromo Named Entity Recognition with Multiple Methods
Abdo Ababor Abafogi
A New Vulnerability Reporting Framework for Software Vulnerability Databases
Hakan Kekül, Burhan Ergen, Halil Arslan
Performance with Eloquent and Query Builder in Crowdfunding System with Laravel Framework
Putu Adi Guna Permana, Evi Triandini
Evaluation of Machine Learning Techniques for Email Spam Classification
Mahmoud Jazzar, Rasheed F. Yousef, Derar Eleyan
Proposal of Enhanced FDD Process Model
Zahid Nawaz
Machine Learning-based Distributed Denial of Service Attacks Detection Technique using New Features in Software-defined Networks
Waheed G. Gadallah, Nagwa M. Omar, Hosny M. Ibrahim
Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors
D. P. Gaikwad
A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems
Sheeba Armoogum, Nawaz Mohamudally
A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks
Aaron Zimba
Non-invasive Detection of Parkinson's Disease Using Deep Learning
Chiranji Lal Chowdhary, R. Srivatsan
Implementation of Improved Cryptography Algorithm
Rohit Verma, Jyoti Dhiman
An Intelligent Ensemble Classification Method For Spam Diagnosis in Social Networks
Ali Ahraminezhad, Musa Mojarad, Hassan Arfaeinia
Text Classification based on Discriminative-Semantic Features and Variance of Fuzzy Similarity
Pouyan Parsafard, Hadi Veisi, Niloofar Aflaki, Siamak Mirzaei
Enabling Trust in Single Sign-On Using DNS Based Authentication of Named Entities
Usman Aijaz N., Nikita Mittal, Mohammed Misbahuddin, A. Syed Mustafa
Smart Home Security Using Facial Authentication and Mobile Application
Khandaker Mohammad Mohi Uddin, Shohelee Afrin Shahela, Naimur Rahman, ‪Rafid Mostafiz‬, Md. Mahbubur Rahman‬‬‬
Ontologies as Building Blocks of Cloud Security
Naila Samad Shaikh, Affan Yasin, Rubia Fatima
Data Privacy System Using Steganography and Cryptography
Olawale Surajudeen Adebayo, Shefiu Olusegun Ganiyu, Fransic Bukie Osang, Salawu Sule Ajiboye, Kasim Mustapha Olamilekan, Lateefah Abdulazeez
A Multiclass Approach to Estimating Software Vulnerability Severity Rating with Statistical and Word Embedding Methods
Hakan Kekül, Burhan Ergen, Halil Arslan
K-Nearest Neighbors Bayesian Approach to False News Detection from Text on Social Media
Ogunsuyi Opeyemi J., Adebola K. OJO