To search, Click below search items.
All Published Papers Search Service
Title
Analysis of MANET¡¯s Routing Protocols, Security Attacks and Detection Techniques- A Review
Author
Amina Yaqoob Alma Shamas Jawwad Ibrahim
Vol. 24 No. 6 pp. 23-32
Keywords
Routing Protocols, DSDV, AODV, DSR, TORA, ZRP, Security Attacks, Detection Techniques
Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing
Ayako Ohshiro, Takeo Okazaki, Takashi Kano, and Shinichiro Ueda
Vol. 24 No. 6 pp. 1-7
Pointwise Mutual Information, Simpson coefficient, Doc2vec, BERT, Newspaper.
Blockchain-based authentication for IoT
Alaa Alsubhi. Jawaher Alhrthi and Wajdi Alhakami
Vol. 24 No. 5 pp. 198-204
Blockchain, IoT, authentication, security
A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications
Mohammad Y. Khanafseh, Ola M. Surakhi
Vol. 24 No. 5 pp. 79-88
High Dimensional Data, Hash Function, Information Retrieval, Locality Sensitive Hashing, Nearest Neighbors Search, Similarity