To search, Click below search items.
All Published Papers Search Service
Title
An Efficient Intrusion Detection System for Attacks Detection in MQTT Protocol Using Machine Learning
Author
Tahani Gazdar
Vol. 22 No. 11 pp. 791-798
Keywords
IoT, Intrusion detection system, Machine Learning, MQTT, Feature
Hybrid Tensor Flow DNN and Modified Residual Network Approach for Cyber Security Threats Detection in Internet of Things
Abdulrahman Mohammed Alshehri and Mohammed Saeed Fenais
Vol. 22 No. 10 pp. 237-245
IoT, malware detection, software piracy, cyber security, data mining, Tensor flow DNN.
Reviewing And Analysis of The Deadlock Handling Methods
Enas E. El-Sharawy, Thowiba E Ahmed, Reem H Alshammari
Vol. 22 No. 10 pp. 230-236
Operating System, CPU Management, Deadlock Handling Methods, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, And Recovery.
Adopting Graph-Based Machine Learning Algorithms to Classify Android Malware
Abdelrahman Elsharif Karrar
Vol. 22 No. 9 pp. 840-849
Graph-Based Model; Machine Learning; Classification Algorithms; Android Malware Detection.