Zeitschriftenartikel zum Thema „Malicious behavior pattern“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Malicious behavior pattern" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Seo, Jungwoo, und Sangjin Lee. „Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling“. Security and Communication Networks 2018 (04.09.2018): 1–24. http://dx.doi.org/10.1155/2018/9706706.
Der volle Inhalt der QuelleKhan, Abdul Karim, Chris M. Bell und Samina Quratulain. „The two faces of envy: perceived opportunity to perform as a moderator of envy manifestation“. Personnel Review 46, Nr. 3 (03.04.2017): 490–511. http://dx.doi.org/10.1108/pr-12-2014-0279.
Der volle Inhalt der QuelleSong, Chongya, Alexander Pons und Kang Yen. „AA-HMM: An Anti-Adversarial Hidden Markov Model for Network-Based Intrusion Detection“. Applied Sciences 8, Nr. 12 (28.11.2018): 2421. http://dx.doi.org/10.3390/app8122421.
Der volle Inhalt der QuelleDhiyanesh, B., und S. Sakthivel. „UBP-Trust: User Behavioral Pattern Based Secure Trust Model for Mitigating Denial of Service Attacks in Software as a Service (SaaS) Cloud Environment“. Journal of Computational and Theoretical Nanoscience 13, Nr. 10 (01.10.2016): 7649–54. http://dx.doi.org/10.1166/jctn.2016.5766.
Der volle Inhalt der QuelleSureda Riera, Tomás, Juan-Ramón Bermejo Higuera, Javier Bermejo Higuera, José-Javier Martínez Herraiz und Juan-Antonio Sicilia Montalvo. „Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review“. Sustainability 12, Nr. 12 (17.06.2020): 4945. http://dx.doi.org/10.3390/su12124945.
Der volle Inhalt der QuelleSoleymani, Ali, und Fatemeh Arabgol. „A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques“. Journal of Computer Networks and Communications 2021 (05.07.2021): 1–13. http://dx.doi.org/10.1155/2021/4767388.
Der volle Inhalt der QuelleHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala und Martin Schramm. „Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data“. Electronics 10, Nr. 17 (04.09.2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Der volle Inhalt der QuelleLange, Jens, Delroy L. Paulhus und Jan Crusius. „Elucidating the Dark Side of Envy: Distinctive Links of Benign and Malicious Envy With Dark Personalities“. Personality and Social Psychology Bulletin 44, Nr. 4 (22.12.2017): 601–14. http://dx.doi.org/10.1177/0146167217746340.
Der volle Inhalt der QuelleSikder, Amit Kumar, Leonardo Babun und A. Selcuk Uluagac. „A egis +“. Digital Threats: Research and Practice 2, Nr. 1 (März 2021): 1–33. http://dx.doi.org/10.1145/3428026.
Der volle Inhalt der QuelleYu, WangYang, Chun Gang Yan, ZhiJun Ding, ChangJun Jiang und MengChu Zhou. „Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns“. IEEE Transactions on Automation Science and Engineering 13, Nr. 2 (April 2016): 647–62. http://dx.doi.org/10.1109/tase.2014.2362819.
Der volle Inhalt der QuelleAslan, Ömer, Refik Samet und Ömer Özgür Tanrıöver. „Using a Subtractive Center Behavioral Model to Detect Malware“. Security and Communication Networks 2020 (27.02.2020): 1–17. http://dx.doi.org/10.1155/2020/7501894.
Der volle Inhalt der QuelleJang, Jae-wook, und Huy Kang Kim. „Function-Oriented Mobile Malware Analysis as First Aid“. Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Der volle Inhalt der QuelleAridoss, Manimaran. „Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications“. International Journal of Handheld Computing Research 8, Nr. 4 (Oktober 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Der volle Inhalt der QuelleHall, Calum, Lynsay Shepherd und Natalie Coull. „BlackWatch: Increasing Attack Awareness within Web Applications“. Future Internet 11, Nr. 2 (15.02.2019): 44. http://dx.doi.org/10.3390/fi11020044.
Der volle Inhalt der QuelleJIAO, WENPIN. „ESTABLISHING MUTUAL-BELIEF AMONG COOPERATIVE AGENTS“. International Journal of Pattern Recognition and Artificial Intelligence 16, Nr. 08 (Dezember 2002): 973–93. http://dx.doi.org/10.1142/s0218001402002118.
Der volle Inhalt der QuelleTao, Yufei. „Technical Perspective of Efficient Directed Densest Subgraph Discovery“. ACM SIGMOD Record 50, Nr. 1 (15.06.2021): 32. http://dx.doi.org/10.1145/3471485.3471493.
Der volle Inhalt der QuelleErmagun, Alireza, und Nazanin Tajik. „Recovery patterns and physics of the network“. PLOS ONE 16, Nr. 1 (19.01.2021): e0245396. http://dx.doi.org/10.1371/journal.pone.0245396.
Der volle Inhalt der QuelleMamedova, Natalia, Arkadiy Urintsov, Olga Staroverova, Evgeniy Ivanov und Dmitriy Galahov. „Social engineering in the context of ensuring information security“. SHS Web of Conferences 69 (2019): 00073. http://dx.doi.org/10.1051/shsconf/20196900073.
Der volle Inhalt der QuelleZHOU, Huaizhe, Haihe BA, Yongjun WANG und Tie HONG. „On the Detection of Malicious Behaviors against Introspection Using Hardware Architectural Events“. IEICE Transactions on Information and Systems E103.D, Nr. 1 (01.01.2020): 177–80. http://dx.doi.org/10.1587/transinf.2019edl8148.
Der volle Inhalt der QuelleXi, Xiangyu, Tong Zhang, Wei Ye, Zhao Wen, Shikun Zhang, Dongdong Du und Qing Gao. „An Ensemble Approach for Detecting Anomalous User Behaviors“. International Journal of Software Engineering and Knowledge Engineering 28, Nr. 11n12 (November 2018): 1637–56. http://dx.doi.org/10.1142/s0218194018400211.
Der volle Inhalt der QuellePertiwi, Nirmala Fajar, und Ice Yulia Wardani. „HARGA DIRI REMAJA DAN POLA ASUH ORANGTUA SEBAGAI FAKTOR PROTEKTIF IDE BUNUH DIRI“. Jurnal Ilmiah Permas: Jurnal Ilmiah STIKES Kendal 9, Nr. 3 (17.07.2019): 301–10. http://dx.doi.org/10.32583/pskm.9.3.2019.301-310.
Der volle Inhalt der QuelleHu, Jinlong, Junjie Liang und Shoubin Dong. „iBGP: A Bipartite Graph Propagation Approach for Mobile Advertising Fraud Detection“. Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6412521.
Der volle Inhalt der QuelleSu, Han, Minglun Ren, Anning Wang, Xiaoan Tang, Xin Ni und Zhao Fang. „A Behavior-Driven Forum Spammer Recognition Method with Its Application in Automobile Forums“. Mathematical Problems in Engineering 2021 (30.08.2021): 1–11. http://dx.doi.org/10.1155/2021/7682579.
Der volle Inhalt der QuelleSu, Ming-Yang, Hong-Siou Wei, Xin-Yu Chen, Po-Wei Lin und Ding-You Qiu. „Using Ad-Related Network Behavior to Distinguish Ad Libraries“. Applied Sciences 8, Nr. 10 (09.10.2018): 1852. http://dx.doi.org/10.3390/app8101852.
Der volle Inhalt der QuelleHyun, Sangwon, Junsung Cho, Geumhwan Cho und Hyoungshick Kim. „Design and Analysis of Push Notification-Based Malware on Android“. Security and Communication Networks 2018 (09.07.2018): 1–12. http://dx.doi.org/10.1155/2018/8510256.
Der volle Inhalt der QuelleKim, Sujeong, Chanwoong Hwang und Taejin Lee. „Anomaly Based Unknown Intrusion Detection in Endpoint Environments“. Electronics 9, Nr. 6 (20.06.2020): 1022. http://dx.doi.org/10.3390/electronics9061022.
Der volle Inhalt der QuelleYassin, Amr Hassan, und Hany Hamdy Hussien. „A Proposed Heuristic Optimization Algorithm for Detecting Network Attacks“. Academic Research Community publication 2, Nr. 4 (01.01.2019): 530. http://dx.doi.org/10.21625/archive.v2i4.397.
Der volle Inhalt der QuelleCarpen-Amarie, Alexandra, Alexandru Costan, Jing Cai, Gabriel Antoniu und Luc Bougé. „Bringing introspection into BlobSeer: Towards a self-adaptive distributed data management system“. International Journal of Applied Mathematics and Computer Science 21, Nr. 2 (01.06.2011): 229–42. http://dx.doi.org/10.2478/v10006-011-0017-y.
Der volle Inhalt der QuellePudjiono, Moch Juli, Bambang Sukarjono und Hery Sumanto. „Penyuluhan Hukum : Pencegahan Kenakalan Remaja Di Desa Ngujung Kecamatan Maospati Kabupaten Magetan“. JURNAL DAYA-MAS 5, Nr. 1 (02.06.2020): 27–31. http://dx.doi.org/10.33319/dymas.v5i1.38.
Der volle Inhalt der QuelleYakubu, Mohammed B., Hussaini DanAzumi, Mohammed Bulama und Abba Hassan. „Intrusion tolerance model against higher institution database“. Global Journal of Information Technology: Emerging Technologies 9, Nr. 1 (30.04.2019): 20–28. http://dx.doi.org/10.18844/gjit.v9i1.4060.
Der volle Inhalt der QuelleVenkatraman, Sitalakshmi, und Mamoun Alazab. „Use of Data Visualisation for Zero-Day Malware Detection“. Security and Communication Networks 2018 (02.12.2018): 1–13. http://dx.doi.org/10.1155/2018/1728303.
Der volle Inhalt der QuelleSafar, Noor Zuraidin Mohd, Noryusliza Abdullah, Hazalila Kamaludin, Suhaimi Abd Ishak und Mohd Rizal Mohd Isa. „Characterising and detection of botnet in P2P network for UDP protocol“. Indonesian Journal of Electrical Engineering and Computer Science 18, Nr. 3 (01.06.2020): 1584. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1584-1595.
Der volle Inhalt der QuelleChristiana, Abikoye Oluwakemi, Benjamin Aruwa Gyunka und Akande Noah. „Android Malware Detection through Machine Learning Techniques: A Review“. International Journal of Online and Biomedical Engineering (iJOE) 16, Nr. 02 (12.02.2020): 14. http://dx.doi.org/10.3991/ijoe.v16i02.11549.
Der volle Inhalt der QuelleJanam, Dr Ram. „Social, Historical and Psychological Realism in Arundhati Roy’s The God of Small Things“. SMART MOVES JOURNAL IJELLH 8, Nr. 5 (30.05.2020): 70. http://dx.doi.org/10.24113/ijellh.v8i5.10583.
Der volle Inhalt der QuelleFaris, Hossam, Maria Habib, Iman Almomani, Mohammed Eshtay und Ibrahim Aljarah. „Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection“. Applied Sciences 10, Nr. 11 (27.05.2020): 3706. http://dx.doi.org/10.3390/app10113706.
Der volle Inhalt der QuelleTan, Rong, Yuan Tao, Wen Si und Yuan-Yuan Zhang. „Privacy preserving semantic trajectory data publishing for mobile location-based services“. Wireless Networks 26, Nr. 8 (15.06.2019): 5551–60. http://dx.doi.org/10.1007/s11276-019-02058-8.
Der volle Inhalt der QuelleHu, Jinlong, Tenghui Li, Yi Zhuang, Song Huang und Shoubin Dong. „GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising“. Security and Communication Networks 2020 (04.09.2020): 1–12. http://dx.doi.org/10.1155/2020/8810817.
Der volle Inhalt der QuelleMarchenko, Konstantyn, Oleh Oryshaka und Anzhelyka Marchenko. „Information Security Challenges in the Context of the Epidemic“. Central Ukrainian Scientific Bulletin. Technical Sciences, Nr. 3(34) (Oktober 2020): 22–31. http://dx.doi.org/10.32515/2664-262x.2020.3(34).22-31.
Der volle Inhalt der QuelleHuancayo Ramos, Katherinne Shirley, Marco Antonio Sotelo Monge und Jorge Maestre Vidal. „Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics“. Sensors 20, Nr. 16 (12.08.2020): 4501. http://dx.doi.org/10.3390/s20164501.
Der volle Inhalt der QuelleJeong, Sihyun, und Kyu-haeng Lee. „Spam Classification Based on Signed Network Analysis“. Applied Sciences 10, Nr. 24 (15.12.2020): 8952. http://dx.doi.org/10.3390/app10248952.
Der volle Inhalt der QuelleKrishna, T. Shiva Rama. „Malware Detection using Deep Learning“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VI (20.06.2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Der volle Inhalt der QuelleNayyar, Anand, Pijush Kanti Dutta Pramankit und Rajni Mohana. „Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions“. Scalable Computing: Practice and Experience 21, Nr. 3 (01.08.2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.
Der volle Inhalt der QuelleAbdelhedi, Fatma, und Nabil Derbel. „Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances“. Advances in Science, Technology and Engineering Systems Journal 2, Nr. 3 (Juni 2016): 513–19. http://dx.doi.org/10.25046/aj020366.
Der volle Inhalt der QuelleBiran, Yahav, George Collins, Borky John M und Joel Dubow. „Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud“. Advances in Science, Technology and Engineering Systems Journal 2, Nr. 3 (Juni 2017): 553–61. http://dx.doi.org/10.25046/aj020371.
Der volle Inhalt der Quelle„Electronic Credit Card Fraud Detection System by Collaboration of Machine Learning Models“. International Journal of Innovative Technology and Exploring Engineering 8, Nr. 12S (26.12.2019): 92–94. http://dx.doi.org/10.35940/ijitee.l1028.10812s19.
Der volle Inhalt der QuelleObeidat, Ibrahim, und Mazen AlZubi. „DEVELOPING A FASTER PATTERN MATCHING ALGORITHMS FOR INTRUSION DETECTION SYSTEM“. International Journal of Computing, 30.09.2019, 278–84. http://dx.doi.org/10.47839/ijc.18.3.1520.
Der volle Inhalt der Quelle„Privacy Protection Against Insider Attacks“. International Journal of Engineering and Advanced Technology 9, Nr. 5 (30.06.2020): 576–78. http://dx.doi.org/10.35940/ijeat.e9744.069520.
Der volle Inhalt der QuelleNovikova, Evgenia, Polina Belimova, Alena Dzhumagulova, Mikhail Bestuzhev, Yulia Bezbakh, Aleksandr Volosiuk, Andrey Balkanskii und Alexei Lavrov. „Usability Assessment of the Visualization-Driven Approaches to the HVAC Data Exploration“. Proceedings of the 30th International Conference on Computer Graphics and Machine Vision (GraphiCon 2020). Part 2, 17.12.2020, paper17–1—paper17–12. http://dx.doi.org/10.51130/graphicon-2020-2-3-17.
Der volle Inhalt der Quelle„Detection of Malware attacks in smart phones using Machine Learning“. International Journal of Innovative Technology and Exploring Engineering 9, Nr. 1 (10.11.2019): 4396–400. http://dx.doi.org/10.35940/ijitee.a5082.119119.
Der volle Inhalt der QuellePeng, Tu, Shuliang Wang, Jing Geng, Qinsi Wang, Yun Yang und Kang Zhang. „Verification of the Instantiation and Integration of Security Patterns“. Journal of Web Engineering, 20.08.2020. http://dx.doi.org/10.13052/jwe1540-9589.19347.
Der volle Inhalt der Quelle