To search, Click below search items.
All Published Papers Search Service
Title
A Review of Security and Privacy of Cloud Based E-Healthcare Systems
Author
Faiza Nawaz, Jawwad Ibrahim, and Maida Junaid
Vol. 24 No. 6 pp. 153-160
Keywords
Cloud Computing, Electronic Healthcare System, Security, Privacy Health Information Technology
Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing
Ayako Ohshiro, Takeo Okazaki, Takashi Kano, and Shinichiro Ueda
Vol. 24 No. 6 pp. 1-7
Pointwise Mutual Information, Simpson coefficient, Doc2vec, BERT, Newspaper.
A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications
Mohammad Y. Khanafseh, Ola M. Surakhi
Vol. 24 No. 5 pp. 79-88
High Dimensional Data, Hash Function, Information Retrieval, Locality Sensitive Hashing, Nearest Neighbors Search, Similarity
Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds
Ehtsham Irshad and Abdul Basit Siddiqui
Vol. 24 No. 4 pp. 179-191
Cyber-threat intelligence (CTI), Security Information and event management (SIEM), Intrusion detection system (IDS), Intrusion prevention system (IPS), Denial of service (DoS), Principal component analysis (PCA), Support vector machine (SVM), Indicators o