Found: 35
Select item for more details and to access through your institution.
DFCL: DYNAMIC FUZZY LOGIC CONTROLLER FOR INTRUSION DETECTION.
- Published in:
- Facta Universitatis, Series: Mechanical Engineering, 2014, v. 12, n. 2, p. 183
- By:
- Publication type:
- Article
Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis.
- Published in:
- International Journal of Environmental Research & Public Health, 2022, v. 19, n. 10, p. 6269, doi. 10.3390/ijerph19106269
- By:
- Publication type:
- Article
MapReduce scheduling algorithms: a review.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 7, p. 4915, doi. 10.1007/s11227-018-2719-5
- By:
- Publication type:
- Article
Retraction Note to: Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction.
- Published in:
- Stochastic Environmental Research & Risk Assessment, 2019, v. 33, n. 4-6, p. 1245, doi. 10.1007/s00477-019-01675-1
- By:
- Publication type:
- Article
Service delivery models of cloud computing: security issues and open challenges.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4726, doi. 10.1002/sec.1585
- By:
- Publication type:
- Article
A response selection model for intrusion response systems: Response Strategy Model (RSM).
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1831, doi. 10.1002/sec.896
- By:
- Publication type:
- Article
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 9, p. 1087, doi. 10.1002/sec.673
- By:
- Publication type:
- Article
Detecting opinion spams through supervised boosting approach.
- Published in:
- PLoS ONE, 2018, v. 13, n. 6, p. 1, doi. 10.1371/journal.pone.0198884
- By:
- Publication type:
- Article
Ground Truth Dataset: Objectionable Web Content.
- Published in:
- Data (2306-5729), 2022, v. 7, n. 11, p. 153, doi. 10.3390/data7110153
- By:
- Publication type:
- Article
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.
- Published in:
- Journal of Medical Systems, 2018, v. 42, n. 6, p. 1, doi. 10.1007/s10916-018-0966-x
- By:
- Publication type:
- Article
Retraction Note: Analysis of the social capital indicators by using DEMATEL approach: the case of Islamic Azad University.
- Published in:
- Quality & Quantity, 2020, v. 54, n. 1, p. 191, doi. 10.1007/s11135-019-00949-8
- By:
- Publication type:
- Article
Towards dynamic remote data auditing in computational clouds.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Cloud Service Selection Using Multicriteria Decision Analysis.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/459375
- By:
- Publication type:
- Article
Towards Dynamic Remote Data Auditing in Computational Clouds.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/269357
- By:
- Publication type:
- Article
The rise of "blockchain": bibliometric analysis of blockchain study.
- Published in:
- Scientometrics, 2019, v. 120, n. 3, p. 1289, doi. 10.1007/s11192-019-03170-4
- By:
- Publication type:
- Article
Exploring the Landscape of AI-SDN: A Comprehensive Bibliometric Analysis and Future Perspectives.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 1, p. 26, doi. 10.3390/electronics13010026
- By:
- Publication type:
- Article
Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration.
- Published in:
- Issues in Informing Science & Information Technology, 2006, v. 3, p. 45, doi. 10.28945/871
- By:
- Publication type:
- Article
SCALABILITY IMPROVEMENT OF ACTIVE PROBING FOR FAILURE DETECTION IN LARGESCALE SOFTWARE DEFINED NETWORKS USING COMMUNITY DETECTION ALGORITHMS.
- Published in:
- Malaysian Journal of Computer Science, 2023, v. 36, n. 4, p. 1, doi. 10.22452/mjcs.vol36no4.5
- By:
- Publication type:
- Article
GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN.
- Published in:
- Malaysian Journal of Computer Science, 2022, v. 35, n. 3, p. 264, doi. 10.22452/mjcs.vol35no3.5
- By:
- Publication type:
- Article
TWO-STEP MODEL FOR EMOTION DETECTION ON TWITTER USERS: A COVID-19 CASE STUDY IN MALAYSIA.
- Published in:
- Malaysian Journal of Computer Science, 2021, v. 34, n. 4, p. 374, doi. 10.22452/mjcs.vol34no4.4
- By:
- Publication type:
- Article
THE FEASIBILITY OF EMPLOYING IEEE802.11P IN ELECTRONIC-BASED CONGESTION PRICING ZONE: A COMPARATIVE STUDY WITH RFID.
- Published in:
- Malaysian Journal of Computer Science, 2016, v. 29, n. 4, p. 247, doi. 10.22452/mjcs.vol29no4.1
- By:
- Publication type:
- Article
IDENTIFYING FALSE ALARM FOR NETWORK INTRUSION DETECTION SYSTEM USING HYBRID DATA MINING AND DECISION TREE.
- Published in:
- Malaysian Journal of Computer Science, 2008, v. 21, n. 2, p. 101, doi. 10.22452/mjcs.vol21no2.3
- By:
- Publication type:
- Article
Building Online Historical Resources Collaboratively: making the most of a digital library to reinforce ICT skills in Malaysia.
- Published in:
- Information Development, 2004, v. 20, n. 3, p. 200, doi. 10.1177/0266666904046830
- By:
- Publication type:
- Article
DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware.
- Published in:
- PLoS ONE, 2016, v. 11, n. 9, p. 1, doi. 10.1371/journal.pone.0162627
- By:
- Publication type:
- Article
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 8, p. 12423, doi. 10.1007/s11042-022-13908-7
- By:
- Publication type:
- Article
A new deep model for family and non-family photo identification.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 2, p. 1765, doi. 10.1007/s11042-021-11631-3
- By:
- Publication type:
- Article
A survey on video content rating: taxonomy, challenges and open issues.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 16, p. 24121, doi. 10.1007/s11042-021-10838-8
- By:
- Publication type:
- Article
SMSAD: a framework for spam message and spam account detection.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 4, p. 3925, doi. 10.1007/s11042-017-5018-x
- By:
- Publication type:
- Article
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 17519, doi. 10.1007/s11042-017-4586-0
- By:
- Publication type:
- Article
Multi-objective scheduling of MapReduce jobs in big data processing.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 8, p. 9979, doi. 10.1007/s11042-017-4685-y
- By:
- Publication type:
- Article
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2023, v. 48, n. 2, p. 1771, doi. 10.1007/s13369-022-06949-5
- By:
- Publication type:
- Article
Bio-inspired for Features Optimization and Malware Detection.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 12, p. 6963, doi. 10.1007/s13369-017-2951-y
- By:
- Publication type:
- Article
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks.
- Published in:
- PLoS ONE, 2022, v. 17, n. 3, p. 1, doi. 10.1371/journal.pone.0264683
- By:
- Publication type:
- Article
Improved temporal IoT device identification using robust statistical features.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2145
- By:
- Publication type:
- Article
Web content topic modeling using LDA and HTML tags.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1459
- By:
- Publication type:
- Article