0 | -- | 0 | Nguyen Canh Thang, Minho Park, Yang-Ick Joo. EVHS - Elastic Virtual Honeypot System for SDNFV-Based Networks |
0 | -- | 0 | Hanaa A. Abdallah, Sara Alsodairi. A novel Watermarking Technique Based on Hybrid Transforms |
0 | -- | 0 | Yassine Serhane, Abderrahim Sekkaki, Karim Benzidane, Mehdi Abid. Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms |
0 | -- | 0 | Omar Saad Almousa, Hazem Migdady. Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm |
0 | -- | 0 | Sahirul Alam, Selo Sulistyo, I Wayan Mustika, Ronald Adrian. Fuzzy Adaptive Hysteresis of RSS for Handover Decision in V2V VANET |
0 | -- | 0 | Jerry John Kponyo, Justice Owusu Agyemang, Griffith Selorm Klogo. Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach |
0 | -- | 0 | Amr Ibrahim. HP4 High-Performance Programmable Packet Parser |
0 | -- | 0 | Nourah Almrezeq, Lama Almadhoor, Thowg Alrasheed, A. A. Abd El-Aziz, Shadi Nashwan. Design a secure IoT Architecture using Smart Wireless Networks |
0 | -- | 0 | Mohammed Assaouy, Ouadoudi Zytoune, Mohamed Ouadou. Rapid Learning Optimization Approach for Battery Recovery-Aware Embedded System Communications |
0 | -- | 0 | Siham Arfaoui, Abdellatif Mezrioui, Abdelhamid Belmekki. A Methodology for Assuring Privacy by Design in Information Systems |
0 | -- | 0 | Noor Azleen Anuar, Mohd Zaki Mas'ud, Nazrulazhar Bahamanan, Nor Azman Mat Ariff. Mobile Malware Behaviour through Opcode Analysis |
0 | -- | 0 | Simon Atuah Asakipaam, Jerry John Kponyo, Justice Owusu Agyemang, Fredrick Appiah-Twum. AP Design of a Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks |
0 | -- | 0 | Kayode Yakub Saheed, Fatimah E. Usman-Hamza. Feature Selection with IG-R for Improving Performance of Intrusion Detection System |
0 | -- | 0 | Mahmoud Rajallah Asassfeh, Nadim Obeid, Wesam Almobaideen. Anonymous Authentication Protocols for IoT Based Healthcare: A Survey |
0 | -- | 0 | Mohamed El Ghmary, Youssef Hmimz, Tarik Chanyour, Mohammed Ouçamah Cherkaoui Malki. Energy and Processing Time Efficiency for an Optimal Offloading in a Mobile Edge Computing Node |
0 | -- | 0 | Atef A. Obeidat. Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network |
0 | -- | 0 | Jawad Hasan Yasin AlKhateeb. Handwritten Arabic Digit Recognition Using Convolutional Neural Network |
0 | -- | 0 | Melwin Syafrizal, Siti Rahayu Selamat, Nurul Azma Zakaria. Analysis of Cybersecurity Standard and Framework Components |
0 | -- | 0 | Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq, Abdullah Abdulhai Alshaher, Mubarak Mohammad Alkharang. Evolution of Malware Threats and Techniques: a Review |