Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
About Big Data Measurement Methodologies and Indicators
Makrufa Sh. Hajirahimova, Aybeniz S. Aliyeva
Error prone transmission system to resist data loss in a wireless sensor network
Sunil Kumar, C. Rama Krishna, A. K. Solanki
Distributed denial of service detection using multi layered feed forward artificial neural network
Ismaila Idris, Obi Blessing Fabian, Shafi’i M. Abdulhamid, Morufu Olalere, Baba Meshach
Monitoring of military base station using flooding and ACO technique: an efficient approach
Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg
A new approach for data hiding based on pixel pairs and chaotic map
Sengul Dogan
Comparative analysis of classification algorithms for email spam detection
Shafi’i Muhammad Abdulhamid, Maryam Shuaib, Oluwafemi Osho, Idris Ismaila, John K. Alhassan
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Mohammed Abdul Samad AL-khatib, Auqib Hamid Lone
A multi-agent system-based method of detecting DDoS attacks
Xin Zhang, Ying Zhang, Raees Altaf, Xin Feng
Secure multiparty computation for privacy preserving range queries on medical records for star exchange topology
Ahmed M. Tawfik, Sahar F. Sabbeh, Tarek A. EL-Shishtawy
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves
Aaron Zimba, Victoria Chama
The method of hidden terminal transmission of network attack signatures
Igor Ruban, Nataliia Lukova-Chuiko, Vadym Mukhin, Yaroslav Kornaga, Igor Grishko, Anton Smirnov
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Divya Chaudhary, Bijendra Kumar
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Himadri N. Saha, Prachatos Mitra
Forensics image acquisition process of digital evidence
Erhan Akbal, Sengul Dogan
Security evaluation of cellular networks handover techniques
Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony Rodgrigues
Efficient multimedia transmission over scalable IoT architecture
Vasileios A. Memos
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Rishabh Dudheria
A state-of-the-art survey of coverless text information hiding
Shahbaz Ali
A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions
Ibraheem Kasim Ibraheem, Alyaa Abdul-Hussain Al-Hussainy
Performance comparison of steganography techniques
Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta
Role of scripting language on Unix operating system for risk assessment
Padma Lochan Pradhan
Verification of web content integrity: detection and recovery security approach using colored petri nets
Sherin Hijazi, Amjad Hudaib
Evaluation of different routing protocols for mobile ad-hoc networks in scenarios with high-speed mobility
Antonio Russoniello, Eric Gamess
An email modelling approach for neural network spam filtering to improve score-based anti-spam systems
Yahya Alamlahi, Abdulrahman Muthana
An integrated perceptron kernel classifier for intrusion detection system
Ruby Sharma, Sandeep Chaurasia
Identification of compromised nodes in MANETs using machine learning technique
Rodney Sebopelo, Bassey Isong, Naison Gasela
Understanding the evolution of ransomware: paradigm shifts in attack structures
Aaron Zimba, Mumbi Chishimba
The AODV extension protocol named AODV_SPB
Amina Guidoum, Aoued Boukelif
Intrusion detection using machine learning and feature selection
Prachi, Heena Malhotra, Prabha Sharma
Distributed wormhole attack mitigation technique in WSNs
Sharada Kori, Krishnamurthy G. N., Nandini Sidnal
A passive approach for detecting image splicing using deep learning and haar wavelet transform
Eman I. Abd El-Latif, Ahmed Taha, Hala H. Zayed
Cloud-based framework for efficient storage of unstructured patient health records
Hanya M. Abdallah, Ahmed Taha, Mazen M. Selim
A mobile application of augmented reality for aircraft maintenance of fan cowl door opening
Sei Wei Yong, Aun Naa Sung
Open source intelligence testing using the OWASP version 4 framework at the information gathering stage (Case Study: X Company)
I Putu Agus Eka Pratama, Anak Agung Bagus Arya Wiradarma
Ensemble feature selection and classification of internet traffic using XGBoost classifier
N. Manju, B. S. Harish, V. Prajwal
Data mining based framework for effective intrusion detection using hybrid feature selection approach
B.A. Manjunatha, Prasanta Gogoi, M. T. Akkalappa
Parameter training in MANET using artificial neural network
Baisakhi Chatterjee, Himadri Nath Saha
Security policy modelling in the mobile agent system
Hassan Razouki
Solving the Rubik’s cube using simulated annealing and genetic algorithm
Shahram Saeidi