To search, Click below search items.
All Published Papers Search Service
Title
An Analysis of Various Social Engineering Attack in Social Network using Machine Learning Algorithm
Author
Dalal Al-dablan, Amal Al-hamad, Raghad Al-Bahlal, and Maria Altaib Badawi
Vol. 20 No. 10 pp. 46-49
Keywords
Social Engineering, Social engineering attacks, J48 algorithm, Uniform Resource Locator (URL).
Analysis of (IaaS) Cloud computing Security issues concerning websites, Moodle eLMS as an example
Azza Yousif Elmaghrabi and Maria Altaib Badawi
Vol. 20 No. 11 pp. 1-8
IaaS Cloud computing (Infrastructure as a service), Moodle (Modular Object Oriented Dynamic Learning Environment), eLMS (Electronic Learning Management Systems), SEB (Safe exam browser).
Detecting E-Banking Phishing Website Using C4.5 algorithm
Haya alhamad, Tagreed alzyadh, and Maria Altaib Badawi
Vol. 20 No. 11 pp. 46-51
Phishing, Data mining, E-banking, C4.5 algorithm, weka