Proof-of-Work Difficulty Readjustment with Genetic Algorithm
|
2021 |
Chin, Zi Hau |
Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired
|
2021 |
Ho, Yean Li |
Face-Based Graphical Authentication System Using Hybrid Images
|
2021 |
Khaled, Assim Sulaiman |
A Novel Approach of Text Encryption Using Random Numbers and Hash Table
|
2021 |
Das, Abhilash Kumar |
The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server
|
2021 |
Abdulrazzaq, Ali K. |
Malware Detection in Word Documents Using Machine Learning
|
2021 |
Khan, Riya |
Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction
|
2021 |
Balogun, Abdullateef O. |
An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network
|
2021 |
Ghaleb, Sanaa A. A. |
Big Data Analytics: Schizophrenia Prediction on Apache Spark
|
2021 |
Saputra, Yudhi Fajar |
A Labeled Transactions-Based Dataset on the Ethereum Network
|
2021 |
Al-E'mari, Salam |
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector
|
2021 |
Farukee, Minhaz Bin |
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions
|
2021 |
Pahlevanzadeh, Bahareh |
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study
|
2021 |
Taylor, Sarah K. |
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network
|
2021 |
Ghaleb, Sanaa A. A. |
Static Ransomware Analysis Using Machine Learning and Deep Learning Models
|
2021 |
Gaur, Kartikeya |
Finger Vein Presentation Attack Detection with Optimized LBP Variants
|
2021 |
Lee, W. Q. Janie |
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud
|
2021 |
Aun, Yichiet |
Study of Container-Based Virtualisation and Threats in Fog Computing
|
2021 |
Mahadevappa, Poornima |
Protecting Data by Improving the Performance of Controlling Expansion Method
|
2021 |
Ahmad, Tohari |
Compromising the Data Integrity of an Electrical Power Grid SCADA System
|
2021 |
Qassim, Qais Saif |