267 | -- | 283 | Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi-Alli, Adebola Olayinka Adekunle, Joseph Bamidele Awotunde. Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection |
284 | -- | 296 | Yuancheng Li, Haiyan Hou, Wenping Chen. A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing |
297 | -- | 309 | Ali Cherif Khalfallah, Naima Hadj-Said, Ali Pacha Adda. A new chaotic encrypted image based on the trigonometric circle |
310 | -- | 326 | Abdalla Alameen, Ashu Gupta. Fitness rate-based rider optimization enabled for optimal task scheduling in cloud |
327 | -- | 340 | Samir Chabbi, Rachid Boudour, Fouzi Semchedine, Djalel Chefrour. Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone |
341 | -- | 365 | Zakaria Hassan Abdelwahab, Talaat A. Elgarf, Abdelhalim Zekry. Approved algorithmic security enhancement of stream cipher for advanced mobile communications |
366 | -- | 381 | Thakkalapally Preethi, B. B. Amberker. Lattice-based group signature scheme without random oracle |