Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza |
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek |
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana |
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Bui Thanh Khoa, Nguyen Duong Thuc Vi |
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad A. Aladaileh |
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Rafia Afzal, Raja Kumar Murugesan |
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi |
Optimized Stacking Ensemble Model to Detect Phishing Websites. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf |
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah |
Analysis of File Carving Approaches: A Literature Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Waddah Saeed |
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau |
SQL Injection Prevention in Web Application: A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jason Chia, Ji-Jian Chin, Sook-Chin Yip |
Pluggable Authentication Module Meets Identity-Based Identification. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Faraz Masood, Arman Rasool Faridi |
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh |
Cascade Generalization Based Functional Tree for Website Phishing Detection. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Vu Le, Ramin Moazeni, Melody Moh |
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam |
Intrusion Detection Systems in Fog Computing - A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ali Haider Shamsan, Arman Rasool Faridi |
Security Issues and Challenges in SDN. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf |
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami |
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim M. Ahmed, Manar Younis Kashmoola |
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gerard Ward, Lech J. Janczewski |
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) |
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer |
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb |
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani |
Blockchain-Based Incentive Mechanism to Combat Fake News. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Poornima Mahadevappa, Raja Kumar Murugesan |
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar (eds.) |
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah |
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abhilash Kumar Das, Nirmalya Kar |
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Kreppein, Alexander Kies, Robert H. Schmitt |
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli |
CLH: Approach for Detecting Deep Fake Videos. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Haidar Raad Shakir, Suhad Abbas Yassir |
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde |
An Implementation of Robust User Authentication Technique for Big Data Platform. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah |
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah |
Securing Software Defined Networking Using Intrusion Detection System - A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Fatina Shukur |
Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed |
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil |
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yudhi Fajar Saputra, Mahmoud Ahmad Al-Khasawneh |
Big Data Analytics: Schizophrenia Prediction on Apache Spark. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abdul Alif Zakaria, A. H. Azni 0001, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud |
Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Victor Elijah Adeyemo, Abdullateef Oluwagbemiga Balogun, Hammed Adeleye Mojeed, Noah Oluwatobi Akande, Kayode S. Adewole |
Ensemble-Based Logistic Model Trees for Website Phishing Detection. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jetli Chung, Jing-Zhi Koay, Yu-Beng Leau |
A Review on Social Media Phishing: Factors and Countermeasures. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hasanen Alyasiri |
Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Azmi Shawkat Abdulbaqi, Salwa Mohammed Nejrs, Sawsan D. Mahmood, Ismail Yusuf Panessai |
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) |
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Shuaib, Shadab Alam, Salwani Mohd Daud |
Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau |
A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Uzma Jafar, Mohd Juzaiddin Ab Aziz |
A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti |
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abdullateef Oluwagbemiga Balogun, Shuib Basri, Said Jadid Abdulkadir, Saipunidzam Mahamad, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Ganesh M. Kumar |
Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy |
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Lim Siew-Hong, Yu-Beng Leau |
A Performance Study of a Modified Grey Network Traffic Prediction Mechanism. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem |
An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Riya Khan, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
Malware Detection in Word Documents Using Machine Learning. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jason Chia, Ji-Jian Chin, Sook-Chin Yip |
Evaluating Pairing-Free Identity-Based Identification Using Curve25519. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abhilash Kumar Das, Nirmalya Kar |
A Novel Approach of Text Encryption Using Random Numbers and Hash Table. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi |
Compromising the Data Integrity of an Electrical Power Grid SCADA System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Minhaz Bin Farukee, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar |
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bahareh Pahlevanzadeh, Sara Koleini, Suzi Iryanti Fadilah |
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Poornima Mahadevappa, Raja Kumar Murugesan |
Study of Container-Based Virtualisation and Threats in Fog Computing. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yean Li Ho, Michael Teck Hong Gan, Siong-Hoe Lau, Afizan Azman |
Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai |
SMOTE-Based Framework for IoT Botnet Attack Detection. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam |
A Labeled Transactions-Based Dataset on the Ethereum Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tohari Ahmad, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie |
Protecting Data by Improving the Performance of Controlling Expansion Method. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kean-Wah Cheng, Swee-Huay Heng |
Blockchain-Based Content Sharing and Data Repository System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kartikeya Gaur, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
Static Ransomware Analysis Using Machine Learning and Deep Learning Models. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sarah K. Taylor, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin, S. N. Huda S. Abdullah |
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Usman Mohammed Gana, Aman Jantan, Mohd Najwadi Yusoff, Ibrahim Abdullahi, Muhammad Ubale Kiru, Abdullahi Aminu Kazaure |
Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ali Abdulrazzaq, Awos Kh. Ali, Supriyanto Praptodiyono |
The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Antony Taurshia, G. Jaspher W. Kathrine |
Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Amir Zulhilmi, Salama A. Mostafa, Bashar Ahmed Khalaf, Aida Mustapha, Siti Solehah Tenah |
A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar |
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem |
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood Al Shareeda |
ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zi Hau Chin, Timothy Tzen Vun Yap, Ian K. T. Tan |
Proof-of-Work Difficulty Readjustment with Genetic Algorithm. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar |
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam |
Face-Based Graphical Authentication System Using Hybrid Images. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Ali Abed Al-Asadi, Ahmed A. Alkadhmawee |
Multi-factor Authentication for an Administrator's Devices in an IoT Environment. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Waheed Ali H. M. Ghanem, Yousef A. Baker El-Ebiary, Mohamed Abdulnabi, Mohammad Tubishat, Nayef Abdulwahab Mohammed Alduais, Abdullah B. Nasser, Nibras Abdullah, Ola Ahmed Al-wesabi |
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nazrool Omar, Selvakumar Manickam |
Rule-Based SLAAC Attack Detection Mechanism. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok-Yan Lam |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | W. Q. Janie Lee, Thian Song Ong, Tee Connie, H. T. Jackson |
Finger Vein Presentation Attack Detection with Optimized LBP Variants. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ranil Lee Kotalawela, Jun Hong Lee, Wan Wah Chuah, Kai Wen Luo, Lokman Mohd Fadzil |
Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tee Wee Jing, Raja Kumar Murugesan |
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shatha A. Baker, Ahmed S. Nori |
Internet of Things Security: A Survey. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed M. Elmisery, Mirela Sertovic |
Privacy Preserving Threat Hunting in Smart Home Environments. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Philip Lebedev, Konstantin Kogos, Egor Vasilenko |
On Way to Simplify the Reverse Engineering of UEFI Firmwares. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yichiet Aun, Ming-Lee Gan, Yen-Min Jasmina Khaw |
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Zhen-Kai Wong, Swee-Huay Heng |
Blockchain-Based Image Sharing Application. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh |
Vulnerabilities in Online Food Ordering Website. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin |
Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam |
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syeda Mariam Muzammal, Raja Kumar Murugesan |
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali |
Mobile Authentication Using Tapping Behavior. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani |
Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Ahmed Bahashwan, Mohammed Anbar, Sabri M. Hanshi |
Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Siti-Farhana Lokman, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa |
The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN). |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yean Li Ho, Siong-Hoe Lau, Afizan Azman |
Comparison Between BlindLogin and Other Graphical Password Authentication Systems. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh |
Proof of Bid as Alternative to Proof of Work. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alhamza Munther, Imad J. Mohammed, Mohammed Anbar, Anwer Mustafa Hilal |
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|