Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Enhancing the Cloud Security through RC6 and 3DES Algorithms while Achieving Low-Cost Encryption
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm
Mitigation of Byzantine attack using LSP algorithm in CR Networks through Blockchain Technology
An Analytical Study of Cloud Security Enhancements
A Novel Approach by Integrating Dynamic Network Selection and Security Measures to improve Seamless Connectivity in Ubiquitous Networks
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
Programming SDNs: A Compass for SDN Programmer
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
AI-Driven Network Security: Innovations in Dynamic Threat Adaptation and Time Series Analysis for Proactive Cyber Defense
Cryptographic Resilience and Efficiency: A Comparative Study of NTRU and ECC Cryptographic Mechanisms for Internet of Medical Things
An Evaluation of Systems for Detection and Prevention of DoS Attacks in SDN Networks
Improved Route Discovery Scheme under Blackhole Attack in MANET
Enterprise Private Cloud Platforms: A Systematic Review of Key Vendors
A Survey on the impact of Connection-Aware Congestion Identification in RLNC-Based Networks on Quality of Service
Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling
Detecting Android Malware by Mining Enhanced System Call Graphs
Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT
A Secure VM Placement Strategy to Defend against Co-residence Attack in Cloud Datacentres
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices
A Novel Privacy Preservation Scheme by Matrix Factorized Deep Autoencoder
Optimized Extreme Gradient Boosting with Remora Algorithm for Congestion Prediction in Transport Layer
Quality of Experience Improvement and Service Time Optimization through Dynamic Computation Offloading Algorithms in Multi-access Edge Computing Networks
Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System
Secure Data Storage and Retrieval over the Encrypted Cloud Computing
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Chaotic Map based Random Binary Key Sequence Generation
Survival Analysis of Computers at a University’s Computer Laboratory and Implication on Maintainability
Determination of Security Factors Affecting Internet of Medical Things by Artificial Intelligence Technique
Classification of Food Objects Using Deep Convolutional Neural Network Using Transfer Learning
Data Analysis and Success Prediction of Mobile Games before Publishing on Google Play Store
Monkey Pux Data: Visualization and Prediction of the Observed Number of Affected People in Nigeria
Optimization of Curriculum Content Using Data Mining Methods
Towards an Intelligent Electricity Data Management