1 | -- | 25 | Dung Hoang Le, Nguyen Thanh Vu, Tuan Dinh Le. A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network |
1 | -- | 23 | Peng Li 0011, Chao Xu, He Xu. Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks |
26 | -- | 43 | Sikha Bagui, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui. Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm |
44 | -- | 64 | Hatem Mahmoud Salama, Mohammed Z. Abd El-Mageed, Gouda Ismail Mohamed Salama, Khaled Mahmoud Badran. CSMCSM: Client-Server Model for Comprehensive Security in MANETs |
65 | -- | 98 | Mhamed Zineddine. IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms |
99 | -- | 116 | Sara Namane, Nassira Ghoualmi, Mustafa Kaiiali. Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making |
117 | -- | 137 | Salome James, Thumbur Gowri, Punugu Vasudeva Reddy. Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery |
138 | -- | 152 | Mohamed Abdou Souidi, Noria Taghezout. Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System |
153 | -- | 172 | Preetish Ranjan, Abhishek Vaish. Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks |
173 | -- | 189 | Rawan Baalous, Ronald Poet. Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies |