Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Ontologies as Building Blocks of Cloud Security
Naila Samad Shaikh, Affan Yasin, Rubia Fatima
Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions
Emoghene Ogidiaka, Francisca Nonyelum Ogwueleka, Martins Ekata Irhebhude, Ugochi Orji
A Performance Perspective of Live Migration of Virtual Machine in Cloud Data Center with Future Directions
Divya Kapil, Saurabh Kumar Mishra, Vishan Kumar Gupta
Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing
S. Udhaya Chandrika, T. Pramananda Perumal
Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage
Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko
Intelligent Detection Technique for Malicious Websites Based on Deep Neural Network Classifier
Mustapha A. Mohammed, Seth Alornyo, Michael Asante, Bernard O. Essah
Intelligent Model for Smartphone Addiction Assessment in University Students using Android Application and Smartphone Addiction Scale
Anshika Arora, Pinaki Chakraborty, M.P.S. Bhatia, Aditya Puri
Early Detection of Dementia using Deep Learning and Image Processing
Basavaraj Mali Patil, Megha Rani Raigonda, Sudhir Anakal, Ambresh Bhadrashetty
An Innovative Leukemia Detection System using Blood Samples via a Microscopic Accessory
Azza M. Bin Aof, Ethar A. Awad, Sarah R. Omer, Banazier A. Ibraheem, Zeinab A. Mustafa
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
Samuel Ndichu, Sylvester McOyowo, Henry Okoyo, Cyrus Wekesa
LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment
Jeba Praba. J., R. Sridaran
Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
Krishna Gopal Sharma, Yashpal Singh
A lightweight Data Exchange Format for Mobile Transactions
M.C. Mohammed Shameer, P.P. Abdul Haleem, Yazik K. Puthenpediyakkal
A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on FormSpring in Textual Modality
Sahana V., Anil Kumar K. M., Abdulbasit A. Darem
Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation
Pradeep Kumar, Niraj Singhal, Dhiraj Pandey, Avimanyou Vatsa
Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing
Shruthi G., Monica R. Mundada, S. Supreeth, Bryan Gardiner
Integer Programming Models for Task Scheduling and Resource Allocation in Mobile Cloud Computing
Rasim M. Alguliyev, Rashid G. Alakbarov
Detection of DDOS Attacks on Cloud Computing Environment Using Altered Convolutional Deep Belief Networks
S. Sureshkumar, G.K.D. Prasanna Venkatesan, R. Santhosh
Cyber-physical Systems: Security Problems and Issues of Personnel Information Security Culture
Rasmiyya Sh. Mahmudova
Exploring the Factors and Dimensions of Information Quality for E-learning Systems: A case of Tanzanian Higher Learning Institution
Renatus Mushi, Deogratius M. Lashayo
Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot
Keerti Naregal, Vijay Kalmani
A Concept Review on MOOCs Research Findings – A Qualitative Approach
Salah Al Khafaji, Sriram. B.
Emerging Trends in Database and its Applications in MNC’s
Anushri Gupta, Ritu Shrivastava, Jay Kumar Jain
A Bibliometric Analysis on Chatbot Application in Education
Lily Edinam Bensah, Fati Tahiru, Carlos Ankora, Noble Arden Kuadey
Fast Encryption Scheme for Secure Transmission of e-Healthcare Images
Devisha Tiwari, Bhaskar Mondal, Anil Singh
Technologies Ensuring the Sustainability of Information Security of the Formation of the Digital Economy and their Perspective Development Directions
Alovsat Garaja Aliyev
Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity
Bello Alhaji Buhari, Afolayan Ayodele Obiniyi
Development E-commerce Information System of Agriculture in Samarinda
Asep Nurhuda, Aulia Khoirunnita, Arika Rusli, Dimas K. Umami, Sri Handayani
The Security of Blockchain-based Electronic Health Record: A Systematic Review
C. Eben Exceline, Sivakumar Nagarajan
Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja
Ali H. Farea, Kerem Kucuk
Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET
Francis H. Shajin, Muthusamy Palaniappan, P. Rajesh
Exploring Perceptions and Habits of Sri Lankan Users: A Study on Password Management and Adoption of Password Managers
Prageeth Fernando
Integrating Asymmetric Cryptographic Digital Wallet for Online Services in Nigeria
Theresa Olubukola Omodunbi, Ayomide S. Akindutire, Tolulope Moyosore Awoyelu, Rhoda N. Ikono, Ishaya P. Gambo
A Review Study of Function-as-a-Service for Small Scale Businesses in Pakistan
Muhammad Fahad, Syed Muhammad Taha Rizvi, Waqas Mahmood
Vulnerabilities Assessment of Financial and Government Websites: A Developing Country Perspective
Md. Asif Khan Rifat, Yeasmin Sultana, B. M. Mainul Hossain
A Smart IoT Device for Child’s Safety Real Time Monitoring System
Vinod Kumar B., Sangeetha J.
Evolution of NFT Marketplace for Influencing Buying Behaviour in Sportswear Industry
Medha Prabhakar, Suman De.
A New Query Expansion Approach for Improving Web Search Ranking
Stephen Akuma, Promise Anendah
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach
Najla Odeh, Sherin Hijazi
CodeUP: A Web Application for Collaborative Question-answering System
Yashi Agarwal, P. Raghu Vamsi, Siddhant Jain, Jayant Goel