Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Comparative analysis of classification algorithms for email spam detection
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
A multi-agent system-based method of detecting DDoS attacks
Secure multiparty computation for privacy preserving range queries on medical records for star exchange topology
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves
The method of hidden terminal transmission of network attack signatures
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Forensics image acquisition process of digital evidence
Security evaluation of cellular networks handover techniques
Efficient multimedia transmission over scalable IoT architecture
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
A state-of-the-art survey of coverless text information hiding
A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions
Performance comparison of steganography techniques
Role of scripting language on Unix operating system for risk assessment
Verification of web content integrity: detection and recovery security approach using colored petri nets
Evaluation of different routing protocols for mobile ad-hoc networks in scenarios with high-speed mobility
An email modelling approach for neural network spam filtering to improve score-based anti-spam systems
An integrated perceptron kernel classifier for intrusion detection system
Identification of compromised nodes in MANETs using machine learning technique
Understanding the evolution of ransomware: paradigm shifts in attack structures
The AODV extension protocol named AODV_SPB
Intrusion detection using machine learning and feature selection
Distributed wormhole attack mitigation technique in WSNs
A passive approach for detecting image splicing using deep learning and haar wavelet transform
Cloud-based framework for efficient storage of unstructured patient health records
A mobile application of augmented reality for aircraft maintenance of fan cowl door opening
Open source intelligence testing using the OWASP version 4 framework at the information gathering stage (Case Study: X Company)
Ensemble feature selection and classification of internet traffic using XGBoost classifier
Data mining based framework for effective intrusion detection using hybrid feature selection approach
Parameter training in MANET using artificial neural network
Security policy modelling in the mobile agent system
Solving the Rubik’s cube using simulated annealing and genetic algorithm
Quine-McCluskey: a novel concept for mining the frequency patterns from web data
Keyphrase extraction of news web pages
An enhanced approach for quantitative prediction of personality in Facebook posts
TweetRush: a tool for analysis of twitter data
A bug tracking tool for efficient penetration testing