-
1
المؤلفون: Umma Habiba Akter, Anika Tasneem Nijhum, A. N. M. Asifur Rahman, Khayrun Nahar Riya, Mehedi Hasan Raj, Rashedur M. Rahman
المصدر: Vietnam Journal of Computer Science, Vol 8, Iss 2, Pp 291-310 (2021)
مصطلحات موضوعية: cybersecurity, Computer science, Botnet, Denial-of-service attack, 02 engineering and technology, Computer security, computer.software_genre, lcsh:QA75.5-76.95, Common word, 0202 electrical engineering, electronic engineering, information engineering, support vector machine, botnet, local outlier factor, 020203 distributed computing, Class (computer programming), Local outlier factor, lcsh:T58.5-58.64, business.industry, lcsh:Information technology, 020206 networking & telecommunications, ddos attack, Support vector machine, iot botnet, one-class classifier, lcsh:Electronic computers. Computer science, Internet of Things, business, computer, elliptic envelope
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b18b6b96104a30a1d090ffec8df571ef
http://www.worldscientific.com/doi/epdf/10.1142/S2196888821500123 -
2
المؤلفون: Salma Sassi, Abderrazak Jemai, Adel Jebali
المصدر: Journal of Information and Telecommunication, Vol 5, Iss 1, Pp 16-34 (2021)
مصطلحات موضوعية: lcsh:T58.5-58.64, Computer Networks and Communications, business.industry, Computer science, lcsh:Information technology, Data_MISCELLANEOUS, cloud computing, access control, Inference, Access control, Cloud computing, Computer security, computer.software_genre, Computer Science Applications, lcsh:Telecommunication, ComputingMilieux_GENERAL, inference leakage, lcsh:TK5101-6720, Data outsourcing, Computer Science (miscellaneous), data outsourcing, Electrical and Electronic Engineering, business, computer, secrecy and privacy
-
3
المؤلفون: Ahmed Ibrahim, Naeem Firdous Syed, Craig Valli, Zubair A. Baig
المصدر: Journal of Information and Telecommunication, Vol 4, Iss 4, Pp 482-503 (2020)
مصطلحات موضوعية: iot, Computer Networks and Communications, Network security, Computer science, Denial-of-service attack, security, Computer security, computer.software_genre, lcsh:Telecommunication, lcsh:TK5101-6720, Computer Science (miscellaneous), network security, Electrical and Electronic Engineering, MQTT, lcsh:T58.5-58.64, business.industry, lcsh:Information technology, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, mqtt, Computer Science Applications, Software deployment, dos, Communications protocol, business, Internet of Things, computer
-
4
المصدر: Journal of Information and Telecommunication, Vol 4, Iss 3, Pp 346-362 (2020)
مصطلحات موضوعية: Artificial neural network, lcsh:T58.5-58.64, Computer Networks and Communications, Computer science, lcsh:Information technology, Social engineering (security), Data_MISCELLANEOUS, social engineering, online chat environments, Computer security, computer.software_genre, neural networks, Ensemble learning, Computer Science Applications, lcsh:Telecommunication, machine learning, lcsh:TK5101-6720, Computer Science (miscellaneous), ensemble learning, Electrical and Electronic Engineering, natural language processing, computer
-
5
المؤلفون: Omar Bouattane, Mohamed Youssfi, B. E. Sabir, H. Allali
المصدر: Engineering, Technology & Applied Science Research, Vol 10, Iss 2 (2020)
مصطلحات موضوعية: blockchain, solidity, Blockchain, Smart contract, smart home, Computer science, 0211 other engineering and technologies, Context (language use), 02 engineering and technology, Computer security, computer.software_genre, Home automation, lcsh:Technology (General), ethereum, 0202 electrical engineering, electronic engineering, information engineering, multi-agent systems, 021103 operations research, lcsh:T58.5-58.64, lcsh:Information technology, business.industry, Multi-agent system, 020207 software engineering, internet of things, lcsh:TA1-2040, Solidity, lcsh:T1-995, The Internet, Mobile agent, mobile agents, lcsh:Engineering (General). Civil engineering (General), smart contract, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::348fb23c48c82408687325972132ae6d
https://doi.org/10.48084/etasr.3394 -
6
المؤلفون: J. A. Awokola, O. N. Emuoyibofarhe, Adebayo Omotosho, Justice Emuoyibofarhe, J. O. Mebawondu
المصدر: Engineering, Technology & Applied Science Research, Vol 9, Iss 5 (2019)
مصطلحات موضوعية: Picture Archiving and Communication (PAC), 020205 medical informatics, Computer science, Cloud computing, 02 engineering and technology, Space (commercial competition), Computer security, computer.software_genre, Picture archiving and communication system, lcsh:Technology (General), 0202 electrical engineering, electronic engineering, information engineering, cloud, threat, lcsh:T58.5-58.64, lcsh:Information technology, business.industry, TheoryofComputation_GENERAL, modeling, 020207 software engineering, lcsh:TA1-2040, Order (business), Threat model, e-health, lcsh:T1-995, lcsh:Engineering (General). Civil engineering (General), business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::026757d43cc541aa056f49f5030269d7
https://doi.org/10.48084/etasr.2707 -
7
المؤلفون: Yunshan Cao, Rui Zhou, Rui Zhao, Qingguo Zhou, Haifeng Zhang, Jun Shen, Qingwei Zhou
المصدر: Applied Computing and Informatics, Vol 15, Iss 2, Pp 114-119 (2019)
مصطلحات موضوعية: Flexibility (engineering), Telemedicine, lcsh:T58.5-58.64, lcsh:Information technology, Computer science, Mobile internet, business.industry, Holographic imaging, Hypertension management, Cloud computing, Computer security, computer.software_genre, Delayed diagnosis, medicine.disease, Computer Science Applications, medicine, Personal health, Medical emergency, business, computer, Software, Information Systems
-
8
المصدر: Applied Computing and Informatics, Vol 15, Iss 1, Pp 1-6 (2019)
مصطلحات موضوعية: Religious commitment, Vendor, Computer science, 02 engineering and technology, E-commerce, Computer security, computer.software_genre, Website quality, Extant taxon, Sharia, 020204 information systems, 0502 economics and business, 0202 electrical engineering, electronic engineering, information engineering, Competence (human resources), lcsh:T58.5-58.64, lcsh:Information technology, business.industry, 05 social sciences, Integrated approach, Public relations, Computer Science Applications, 050211 marketing, business, computer, Software, Information Systems
-
9
المؤلفون: Venkata Praveen Kumar Vuppala, Indraneel Sreeram
المصدر: Applied Computing and Informatics, Vol 15, Iss 1, Pp 59-66 (2019)
مصطلحات موضوعية: Computer science, Application layer DDoS attack, Denial-of-service attack, 02 engineering and technology, Computer security, computer.software_genre, Server, 0202 electrical engineering, electronic engineering, information engineering, Bat algorithm, lcsh:T58.5-58.64, business.industry, Network packet, lcsh:Information technology, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, 020206 networking & telecommunications, Application layer, Computer Science Applications, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, 020201 artificial intelligence & image processing, The Internet, business, Trinoo, computer, Software, Information Systems, Computer network
-
10
المؤلفون: Laamari Hlou, M. Tarhda, R. E. Gouri
المصدر: ResearcherID
Engineering, Technology & Applied Science Research, Vol 8, Iss 6 (2018)مصطلحات موضوعية: Network security, Computer science, computer.internet_protocol, Broadband networks, Computer security, computer.software_genre, cover channel, law.invention, Firewall (construction), Internet protocol suite, law, lcsh:Technology (General), Internet Protocol, steganography, hidden channel, lcsh:T58.5-58.64, Steganography, lcsh:Information technology, business.industry, firewall, Information sensitivity, lcsh:TA1-2040, lcsh:T1-995, The Internet, lcsh:Engineering (General). Civil engineering (General), business, TCP/IP, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee4bafe8a43635a9e9949beef31c1078
https://doi.org/10.48084/etasr.2334